Course
This course delves into exploiting an insecure SAML implementation, allowing a malicious user to impersonate another user by tampering with the SAMLResponse. You'll learn how SAML Wrapping attacks work and how to craft an effective attack.
Skills covered
Injection
Authentication
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.