Identity Theft - Attacks on SSO Systems
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a critical vulnerability affecting SAML-based Single Sign-On (SSO) systems in this 41-minute Black Hat conference talk. Delve into the technical details of XML signatures, SAML implementations, and their potential security flaws. Learn about the discovery process, timeline, and implications of this vulnerability that impacts multiple libraries underpinning many SSO systems. Understand the threat model, exploitation techniques, and remediation strategies for the truncation vulnerability in SAML assertions. Gain insights into programmable identity and additional tricks that can compromise SSO security. Suitable for security professionals and developers working with SSO systems.
Syllabus
Introduction
About Me
Agenda
SSO
SAML
XML
Name ID
Attributes
Signature
XML Digital Signature
XML Canonicalization
XML Comments
Saml API
XML API
XML Documents as Trees
Is XML Broken
What We Know
The Timeline
How could this be exploited
Threat Model
Truncation Vulnerability
SAML Assertion
Update Profile Information
Remediation
Exploit Steps
Programmable Identity
One More Trick
HighLevel Steps
Conclusion
Shoutouts
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube