


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
TAGS
social responsibility
ICT security
self-isolation
cybersecurity
security
pentesting
ctf
teleworking
infosec
GDPR
Web Application Penetration Testing
android
Corelan
reversing
Information Leakage
Cyber Defense tool
Web Security
Ransomware attacks
Coronavirus
CCPA
mobile
Phising
computer security
GDPR compliance
capture the flag
pentest
information security
event
Reverse Engineering
TwelveSec
vulnerabilities
Covid-19
Penetration Testing
collaborations
Mobile Security
partnerships
Application Penetration Test
pen-test
IT security
Misconfigurations
social distancing
Privacy
community
cyber security
Burp Extender
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.