Course
This course demonstrates exploiting an insecure SAML implementation, allowing attackers to log into a service provider despite the identity provider's restrictions. The vulnerability arises because the service provider does not verify the claim in the SAMLResponse.
Skills covered
Injection
Authentication
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.