


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
social distancing
cyber security
Misconfigurations
Corelan
Coronavirus
Web Security
capture the flag
Burp Extender
bruteforce
Ransomware attacks
Encryption
Reverse Engineering
information security
Application Penetration Test
TwelveSec
Cyber Defense tool
pen-test
CCPA
social responsibility
ctf
partnerships
Privacy
Mobile Security
GDPR compliance
self-isolation
event
Covid-19
vulnerabilities
computer security
reversing
collaborations
android
Information Leakage
Penetration Testing
GDPR
pentest
IT security
community
teleworking
NY SHIELD
infosec
ICT security
cybersecurity
Web Application Penetration Testing
Ethics
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.