Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
TAGS
vulnerabilities
Corelan
mobile
ethical hacking
social distancing
Covid-19
reversing
penetration test
pen-test
social responsibility
GDPR
CCPA
hacking
Cyber Defense tool
security
capture the flag
pentesting
GDPR compliance
teleworking
ICT security
iot
Burp Extender
pentest
collaborations
community
ctf
Application Penetration Test
partnerships
computer security
Ransomware attacks
TwelveSec
Web Security
Coronavirus
infosec
Mobile Security
Privacy
cybersecurity
Reverse Engineering
self-isolation
cyber security
Misconfigurations
IT security
Penetration Testing
android
Information Leakage
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.