Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Cybersecurity: Ethical Hacking Fundamentals - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This presentation from Black Hat explores Microsoft Intune's security implications, revealing how this cloud-based endpoint management solution can be exploited by attackers. Discover under-documented features that enable Conditional Access bypass in Microsoft Entra ID and learn how Intune's capabilities can be abused to gain unauthorized access to on-premises Active Directory and internal network infrastructure. Principal Consultant Yuya Chudo from Secureworks Japan K.K. demonstrates techniques and tools for exploiting Intune vulnerabilities to breach both cloud and on-premises environments, while providing practical recommendations to secure corporate IT infrastructure against these attack vectors. The 34-minute talk offers valuable insights into the internal mechanisms of Intune, essential knowledge for security professionals managing enterprise device ecosystems.
Syllabus
Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise
Taught by
Black Hat