API Authentication - Attacking Token ( Part - 4 ) | Shahul Hameed

 Attacking Token via Sequencer

Step 1: Log in to the application and retrieve the token value from the response header


Step 2: Before click the start live capture > Make sure configure the settings as show in the below images.


Step 3: Make sure highlight the token value.


Step 4: Click "Analyze Now" to determine the strength of the token value.


Step 5: Use decoding techniques for the token.






Comments

Popular posts from this blog

Using Burp Suite - Brute Force payloads using XSS Validator(Extension) | Shahul Hameed

Janus Vulnerability Exploitation

SQL Basics | Shahul Hameed