Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
TAGS
reversing
pentesting
mobile
Information Leakage
penetration test
security
capture the flag
infosec
ctf
pen-test
CCPA
Misconfigurations
social responsibility
Corelan
Penetration Testing
GDPR
iot
ICT security
ethical hacking
self-isolation
computer security
collaborations
social distancing
IT security
Burp Extender
Cyber Defense tool
Reverse Engineering
teleworking
Ransomware attacks
TwelveSec
Coronavirus
community
hacking
Application Penetration Test
partnerships
GDPR compliance
Covid-19
cyber security
Privacy
pentest
cybersecurity
android
Web Security
vulnerabilities
Mobile Security
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.