How to discover and exploit vulnerabilities in SAML
Now, we will look for the vulnerabilities we may have on SAML. In the following few pages, we will focus only on the attacks particular to SAML, leaving you with references to use to delve into the others.
In this case, we will pull our checklist from threat modeling and then try the various attacks. Let’s start by installing SAML Raider and see whether everything works with the happy case.
Installing SAML Raider
Follow these steps to install SAML Raider:
- Run Burp, as specified in the Run section of Chapter 2.
- From the Burp interface, click on Extensions and then on BApp Store.
Figure 3.2 – BApp Store
- From the BApp Store screen, use the search form on the right and type in
SAML Raider
, and then click on SAML Raider on the screen on the left to select it.
Figure 3.3 – Searching for SAML Raider
- From the screen on the...