Course
This course details the exploitation of an insecure SAML implementation that allows a malicious user to become another user by leveraging default secret keys provided by libraries. The video covers the process of finding the key and tampering with SAMLResponses to gain unauthorized access.
Skills covered
Injection
Authentication
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.