Course
This course demonstrates the exploitation of an insecure SAML implementation, allowing a malicious user to become another user by manipulating the Identity Provider to create an assertion that is parsed differently by the Service Provider.
Skills covered
Injection
Authentication
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.