Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise
35% Off Finance Skills That Get You Hired - Code CFI35
Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
This presentation from Black Hat explores Microsoft Intune's security implications, revealing how this cloud-based endpoint management solution can be exploited by attackers. Discover under-documented features that enable Conditional Access bypass in Microsoft Entra ID and learn how Intune's capabilities can be abused to gain unauthorized access to on-premises Active Directory and internal network infrastructure. Principal Consultant Yuya Chudo from Secureworks Japan K.K. demonstrates techniques and tools for exploiting Intune vulnerabilities to breach both cloud and on-premises environments, while providing practical recommendations to secure corporate IT infrastructure against these attack vectors. The 34-minute talk offers valuable insights into the internal mechanisms of Intune, essential knowledge for security professionals managing enterprise device ecosystems.
Syllabus
Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise
Taught by
Black Hat