2 Videos for SAML: Trusted Embedded Key
This video requires PentesterLab PRO
GO PRO
SAML V: Introduction
In this video, we provide an introduction to the SAML V challenge, focusing on how SAML responses are signed with a private key and the potential vulnerabilities in some implementations that could allow attackers to exploit the certificate verification process.
This video requires PentesterLab PRO
GO PRO
SAML V: Exploitation
This video covers the exploitation of the SAML V challenge, which is part of the authentication and authorization badge. We explore how to manipulate SAML responses and certificates to gain unauthorized access.