banro21 / SAMLRaider

SAML2 Burp Extension

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

SAML Raider - SAML2 Burp Extension

Description

SAML Raider is a Burp Suite extension for testing SAML infrastructures. It contains two core functionalities: Manipulating SAML Messages and manage X.509 certificates.

This software was created by Roland Bischofberger and Emanuel Duss during a bachelor thesis at the Hochschule fΓΌr Technik Rapperswil (HSR). Our project partner and advisor was Compass Security Schweiz AG. We thank Compass for the nice collaboration and support during our bachelor thesis.

Features

The extension is divided in two parts. A SAML message editor and a certificate management tool.

Message Editor

Features of the SAML Raider message editor:

  • Sign SAML Messages
  • Sign SAML Assertions
  • Remove Signatures
  • Edit SAML Message (Supported Messages: SAMLRequest and SAMLResponse)
  • Preview eight common XSW Attacks
  • Execute eight common XSW Attacks
  • Send certificate to SAMl Raider Certificate Management
  • Undo all changes of a SAML Message
  • Supported Profiles: SAML Webbrowser Single Sign-on Profile, Web Services Security SAML Token Profile
  • Supported Bindings: POST Binding, Redirect Binding, SOAP Binding, URI Binding

Message Editor

Certificate Management

Features of the SAML Raider Certificate Management:

  • Import X.509 certificates (PEM and DER format)
  • Import X.509 certificate chains
  • Export X.509 certificates (PEM format)
  • Delete imported X.509 certificates
  • Display informations of X.509 certificates
  • Import private keys (PKCD#8 in DER format and traditional RSA in PEM Format)
  • Export private keys (traditional RSA Key PEM Format)
  • Cloning X.509 certificates
  • Cloning X.509 certificate chains
  • Create new X.509 certificates
  • Editing and self-sign existing X.509 certificates

Certificate Management

Download

Download: saml-raider-1.2.5.jar

Installation

Manual Installation

Start the Burp Suite and click at the Extender tab on Add. Choose the SAML Raider JAR file to install the extension.

Installation from BApp Store

The easy way to install SAML Raider is using the BApp Store. Open Burp and click in the Extender tab on the BApp Store tab. Select SAML Raider and hit the Install button to install our extension.

Don't forget to rate our extension with as many stars you like πŸ˜„.

Usage

To test SAML environments more comfortable, you could add a intercept rule in the proxy settings. Add a new rule which checks if a Parameter Name SAMLResponse is in the request. We hope the usage of our extension is mostly self explaining πŸ˜„. If you have questions, don't hesitate to ask us!

Development

Burp Extender API

The Burp Extender API can be found here: https://portswigger.net/burp/extender/api/index.html.

Build

Clone the project into your workspace:

git clone https://github.com/SAMLRaider/SAMLRaider.git

Import existing project into your Eclipse workspace: File β†’ Import... β†’ Existing Projects into Workspace. Select the cloned folder and press Finish.

Download the latest version of Burp Suite as a JAR file and place it in the lib folder.

Add the Burp Suite JAR file to the libraries: Rightclick on Project β†’ Properties β†’ Java Build Path β†’ Libraries and add the JAR file.

Install maven so you can build SAMLRaider using the build automation tool Maven:

$ mvn install

Load the Burp Extension into Burp: Extender β†’ Add β†’ select the JAR file (with dependencies) in the ./target directory of the project, like ./target/saml-raider-$VERSION-SNAPSHOT-jar-with-dependencies.jar.

Then you can test the extension and rebuild it again after a change.

Tipp: To reload the extension in Burp, without restarting Burp, hit the Ctrl key and click on the checkbox next to the extension in the Extender tab.

Run SAML Raider inside Eclipse

To start the Extension directly from Eclipse, import the Repository into Eclipse. You can directly import a existing Maven Project. Note that the Eclipse Maven Plugin m2e is required. This is included in the latest "Eclipse IDE for Java Developers".

Place the Burp Suite JAR file into the lib folder and add the Burp JAR as a Library in the Eclipse Project (Properties β†’ Build Path β†’ Libraries).

Open the Burp JAR under Referenced Libraries in the Package Explorer and right click in the Package burp on StartBurp.class and select Run As... β†’ Java Application to start Burp and load the Extension automatically. (Or in Eclipse: Run β†’ Debug As β†’ Java Application β†’ StartBurp - burp β†’ OK.)

Debug Mode

To enable the Debug Mode, set the DEBUG Flag in the Class Flags from the Package helpers to true. This will write all output to the SAMLRaiderDebug.log logfile and load example certificates for testing.

Test with fake SAML Response

To send a SAML Response to Burp, you can use the script samltest in the scripts/samltest directory. It sends the SAML Response from saml_response to Burp (localhost:8080) and prints out the modified response from our plugin. You have to install gawk (GNU awk) as awk and libxml2-utils for the xmllint command.

Feedback, Bugs and Feature Requests

Feedback is welcome! Please contact us or create a new issue on GitHub.

Bachelor Thesis

Our Bachelor thesis is available online and can be found here: eprints_BA_SAML2_Burp_Plugin_SAML_Raider_eduss_rbischof.pdf.

License

See the LICENSE file (MIT License) for license rights and limitations.

References

SAML Raider is on the Internet :).

General

SAML Hacking Tutorials

Discovered Vulnerabilities using SAML Raider

Authors

About

SAML2 Burp Extension

License:MIT License


Languages

Language:Java 99.3%Language:Shell 0.4%Language:HTML 0.3%