Skip to content

Testing with short NotOnOrAfter #51

@floyd-fuh

Description

@floyd-fuh

In real-world cases, the SAMLResponse is often only valid for 10 seconds or similar. It would be nice to have a way to use the XSW attacks in an automated way. How do you test with short NotOnOrAfter times?

The full automation of a login and receiving the SAMLResponse is now easy due to the Stepper Burp extension. With Hackvertor we also have options to encode things dynamically. What would be really cool is if SAMLRaider would also support some kind of dynamic marker. I propose something similar to Hackvertor: If the SAMLRaider extension sees some tag (via looking at the traffic in the processHttpMessage Burp API) such as <_@_SAMLRaider_XSW1>PD94bWwgdmVyc2lvbj0iMS4w....Pg%3D%3D<_@/_SAMLRaider_XSW1>, it would take the passed base64 and apply the XSW1 transformation.

However, that's just an idea, I'm open to any suggestions how you test the XSW attacks with very short NotOnOrAfter times.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions