Summary
In this chapter, we learned about the significance of the authentication layer and its associated technologies. Additionally, we gained an understanding of SAML, its vulnerabilities, and the tools used to exploit them. We also learned how to identify and exploit common SAML vulnerabilities.
In conclusion, understanding how to attack SSO with SAML is very important, particularly in enterprise contexts.
In the next chapter, we’ll focus on a typical internet-facing web application, looking at common vulnerabilities, pre- or post-authentication.