Further reading
This chapter covered many topics. If you want to go deeper, weāre happy to share some valuable resources with you:
- [1] J. R. R. Tolkien (2012). Lord of the Rings. 01: The Fellowship of the Ring: the first part of The Lord of the Rings. Boston: Mariner Books/Houghton Mifflin Harcourt.
- [2] attack.mitre.org. (n.d.). Exploit Public-Facing Application, Technique T1190 - Enterprise | MITRE ATT&CK. [online] Available at https://attack.mitre.org/techniques/T1190/.
- [3] attack.mitre.org. (n.d.). Valid Accounts, Technique T1078 - Enterprise | MITRE ATT&CKĀ®. [online] Available at https://attack.mitre.org/techniques/T1078/.
- [4] portswigger.net. (n.d.). SAML Raider. [online] Available at https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e.
- [5] Lowe, T. (2023). yogisec/VulnerableSAMLApp. [online] GitHub. Available at https://github.com/yogisec/VulnerableSAMLApp.
- [6] Lefkowitz, P. (2022). Released: Citrix ADC and Citrix...