You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| 29d9ed98-a469-4536-ade2-f981bc1d605e | Microsoft Authentication Broker |
67
+
| 9ba1a5c7-f17a-4de9-a1f1-6178c8d51223 | Microsoft Intune Company Portal |
68
+
69
+
Hint: Use Microsoft Intune Company Portal for bypassing Intune compliant device Conditional Access Policy ([More Details](https://i.blackhat.com/EU-24/Presentations/EU-24-Chudo-Unveiling-the-Power-of-Intune-Leveraging-Intune-for-Breaking-Into-Your-Cloud-and-On-Premise.pdf))
70
+
71
+
## Next steps with obtained tokens
72
+
Once you have successfully obtained tokens, you can use them with other attack tools, such as:
| 29d9ed98-a469-4536-ade2-f981bc1d605e | Microsoft Authentication Broker |
70
-
| 9ba1a5c7-f17a-4de9-a1f1-6178c8d51223 | Microsoft Intune Company Portal |
71
-
72
-
Hint: Use Microsoft Intune Company Portal for bypassing Intune compliant device Conditional Access Policy ([More Details](https://i.blackhat.com/EU-24/Presentations/EU-24-Chudo-Unveiling-the-Power-of-Intune-Leveraging-Intune-for-Breaking-Into-Your-Cloud-and-On-Premise.pdf))
73
-
74
-
## Next steps with obtained tokens
75
-
Once you have obtained tokens successfully, you can use them with other attack tools like:
0 commit comments