SAML II - Exploitation
This video requires PentesterLab PRO
GO PRO
SAML II - Exploitation
In this video, we explore the exploitation of SAML (Security Assertion Markup Language) vulnerabilities, specifically focusing on how to bypass signature verification in SAML responses. This exercise is part of our Authentication and Authorization badge.