Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise
Overview
This presentation from Black Hat explores Microsoft Intune's security implications, revealing how this cloud-based endpoint management solution can be exploited by attackers. Discover under-documented features that enable Conditional Access bypass in Microsoft Entra ID and learn how Intune's capabilities can be abused to gain unauthorized access to on-premises Active Directory and internal network infrastructure. Principal Consultant Yuya Chudo from Secureworks Japan K.K. demonstrates techniques and tools for exploiting Intune vulnerabilities to breach both cloud and on-premises environments, while providing practical recommendations to secure corporate IT infrastructure against these attack vectors. The 34-minute talk offers valuable insights into the internal mechanisms of Intune, essential knowledge for security professionals managing enterprise device ecosystems.
Syllabus
Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise
Taught by
Black Hat