


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Digital Operational Resilience Act – DORA – Part II March 7, 2025
- Digital Operational Resilience Act – DORA February 26, 2025
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
TAGS
airlines
ADSL
android
apk
Bashdoor
Apple
Christmas
Compromise Assessment
Bearer Token
Architecture Review
Authorization Token
Android App Reversing
communication
Conditions
Application Source Code Review
APPI
Brick & Mortar
Athens
Automotive
ALDI
collaborations
0-day
cell
13033
bruteforce
capture the flag
CCPA
Bank
Aerospace
Clients
Android Security
Car Manufacturers
0day
Compliance
ALPHA BANK
Burp Extender
CDPA
business continuity
community
Business Impact Assessment
adb
Application Penetration Test
computer security
Careers
0-days
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.