Series Layout and Strategy
Article 1: Build Your Own SAML Identity and Relying Party
Article 2: Parsing and Re-signing SAML Assertions
Article 3: XML Signature Wrapping (XSW) Attacks
Article 4: Token Replay and Assertion Forgery
Article 5: Detection and Mitigation
Bonus Article: Browser Automation for Attack Flow
Your First Assignment: Part 1 — Minimal SAML Lab Setup
Goal:
Requirements:
You should produce:
Last updated