


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Digital Operational Resilience Act – DORA – Part II March 7, 2025
- Digital Operational Resilience Act – DORA February 26, 2025
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
TAGS
ALPHA BANK
cell
Apple
APPI
community
computer security
Architecture Review
Aerospace
Android Security
Bank
Compliance
apk
Bearer Token
Bashdoor
13033
Car Manufacturers
Athens
android
0day
0-days
Brick & Mortar
Clients
Android App Reversing
0-day
ADSL
business continuity
Careers
CDPA
communication
Automotive
capture the flag
Compromise Assessment
CCPA
ALDI
Christmas
Burp Extender
Conditions
airlines
bruteforce
adb
Application Source Code Review
Authorization Token
collaborations
Application Penetration Test
Business Impact Assessment
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.