


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Application Penetration Test
Web Application Penetration Testing
CCPA
pen-test
cybersecurity
reversing
information security
Penetration Testing
self-isolation
Coronavirus
Encryption
Information Leakage
collaborations
GDPR
pentest
Burp Extender
ICT security
computer security
cyber security
ctf
Web Security
vulnerabilities
android
GDPR compliance
capture the flag
Corelan
event
Reverse Engineering
Cyber Defense tool
bruteforce
Ransomware attacks
Covid-19
Ethics
social distancing
Misconfigurations
teleworking
IT security
infosec
partnerships
community
NY SHIELD
Privacy
social responsibility
Mobile Security
TwelveSec
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.