Tokens
The below example is based on TCM's Practical API Hacking course.
We can obtain a valid token (Figure 1) and then use Burp's Sequencer to analyze it (Figure 2) and/or Burp's Decoder to decipher its value (Figure 3). In case there is a predictable pattern, we can create a script for generating more tokens and then attempt a BFA with them.

admin
.

Last updated
Was this helpful?