Course
This lab covers the exploitation of an insecure SAML implementation, allowing a malicious user to become another user by manipulating the SAMLResponse from the Identity Provider (IDP). The exercise demonstrates how stripping XML comments can lead to vulnerabilities in Single Sign-On (SSO) systems.
Skills covered
Injection
Authentication
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.