Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise

Black Hat via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
This presentation from Black Hat explores Microsoft Intune's security implications, revealing how this cloud-based endpoint management solution can be exploited by attackers. Discover under-documented features that enable Conditional Access bypass in Microsoft Entra ID and learn how Intune's capabilities can be abused to gain unauthorized access to on-premises Active Directory and internal network infrastructure. Principal Consultant Yuya Chudo from Secureworks Japan K.K. demonstrates techniques and tools for exploiting Intune vulnerabilities to breach both cloud and on-premises environments, while providing practical recommendations to secure corporate IT infrastructure against these attack vectors. The 34-minute talk offers valuable insights into the internal mechanisms of Intune, essential knowledge for security professionals managing enterprise device ecosystems.

Syllabus

Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise

Taught by

Black Hat

Reviews

Start your review of Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.