![Pentesting Java Thick Clients using Burp and JDSer-DComp](https://twelvesec.com/wp-content/uploads/2017/06/Java-code-pentesting-min.jpg)
![Pentesting Java Thick Clients using Burp and JDSer-DComp](https://twelvesec.com/wp-content/uploads/2017/06/Java-code-pentesting-min.jpg)
![Authorization Token manipulation using Burp Suite extender](https://twelvesec.com/wp-content/uploads/2017/05/Featured-Image-1080x675.jpg)
Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
TAGS
infosec
Privacy
capture the flag
Ransomware attacks
Coronavirus
Web Security
Covid-19
reversing
Web Application Penetration Testing
CCPA
teleworking
Burp Extender
security
social responsibility
social distancing
Application Penetration Test
self-isolation
Information Leakage
android
GDPR compliance
TwelveSec
Reverse Engineering
pen-test
GDPR
Cyber Defense tool
partnerships
vulnerabilities
Corelan
IT security
mobile
cybersecurity
Mobile Security
Misconfigurations
iot
pentest
community
Penetration Testing
cyber security
computer security
collaborations
Phising
penetration test
ctf
pentesting
ICT security
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.