Course
This course covers the exploitation of an insecure SAML implementation, allowing a malicious user to impersonate another user. The vulnerability arises from the Service Provider's failure to verify the certificate's fingerprint in the SAMLResponse.
Skills covered
Injection
Authentication
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.