


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Digital Operational Resilience Act – DORA – Part II March 7, 2025
- Digital Operational Resilience Act – DORA February 26, 2025
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
TAGS
Compliance
community
ALPHA BANK
Application Penetration Test
capture the flag
business continuity
Business Impact Assessment
Bashdoor
CCPA
0day
computer security
Compromise Assessment
Bank
Automotive
13033
adb
collaborations
Android App Reversing
android
Christmas
apk
Aerospace
Burp Extender
Architecture Review
Android Security
Brick & Mortar
Careers
bruteforce
Application Source Code Review
0-days
Conditions
cell
Athens
0-day
Authorization Token
airlines
communication
CDPA
ADSL
Bearer Token
APPI
Clients
Car Manufacturers
ALDI
Apple
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.