Course
This course covers the exploitation of an insecure SAML implementation, allowing a malicious user to impersonate another user by tampering with the SAMLResponse. The lab demonstrates practical techniques using tools like Burp and SAML Raider to intercept, modify, and re-encode SAML responses.
Skills covered
Authentication
Authorisation
Cryptography
Operating System
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.