SAML: Signature Wrapping II

Bookmarked!

This exercise covers how to use Signature Wrapping to become an arbitrary user

Course

This course delves into exploiting an insecure SAML implementation, allowing a malicious user to impersonate another user by tampering with the SAMLResponse. You'll learn how SAML Wrapping attacks work and how to craft an effective attack.

Skills covered
Injection Authentication Cryptography
Included with PRO
Full course content 2 videos

Ready to practice?

Get access to this lab and 600+ hands-on exercises with a PRO subscription.