Course
This course explores the exploitation of an insecure SAML implementation, enabling a malicious user to impersonate another user by tampering with the SAMLResponse. The exercise demonstrates how to alter the email address within the SAML response and bypass signature verification.
Skills covered
Authentication
Cryptography
Operating System
Network
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.