Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/zh54321/pocentradevicecompliancebypass
Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy
https://github.com/zh54321/pocentradevicecompliancebypass
entra entraid pentesting pentesting-tools poc powershell redteaming
Last synced: 3 days ago
JSON representation
Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy
- Host: GitHub
- URL: https://github.com/zh54321/pocentradevicecompliancebypass
- Owner: zh54321
- Created: 2024-12-24T21:40:48.000Z (about 2 months ago)
- Default Branch: main
- Last Pushed: 2025-01-05T10:38:57.000Z (about 2 months ago)
- Last Synced: 2025-01-05T11:27:00.581Z (about 2 months ago)
- Topics: entra, entraid, pentesting, pentesting-tools, poc, powershell, redteaming
- Language: PowerShell
- Homepage:
- Size: 13.7 KB
- Stars: 106
- Watchers: 3
- Forks: 9
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# POCEntraDeviceComplianceBypass
A Conditional Access Policy in Entra ID which only require a compliant device can be bypassed using Intune Portal client ID and a special redirect URI.Note that any other Conditional Access Policies and conditions you’ve configured in your tenant will still apply!
# How To
1. Execute the script.
2. Open the Browser Developer tools and authenticate normally.3. After clicking on "Continue" you should see an error message in the Browser console:

4. Click on the URL in the Browser console (ms-appx-web://...) this will open the URL in a new tab.
Copy the content of the code parameter into the script window. This will get you an access and refresh token (stored in $token):
The refresh token can, for example, be used to obtain an access token for Azure AD Graph (scope: user_impersonation) for example using https://github.com/zh54321/EntraTokenAid.git

Or to run ROADrecon (https://github.com/dirkjanm/ROADtools) to enumerate the whole tenant:
```powershell
roadtx gettoken --refresh-token $tokens.refresh_token -c 9ba1a5c7-f17a-4de9-a1f1-6178c8d51223
Requesting token for resource https://graph.windows.net
Tokens were written to .roadtools_auth
PS C:\Tools\EntraTokenAid> roadrecon gather
Starting data gathering phase 1 of 2 (collecting objects)
Starting data gathering phase 2 of 2 (collecting properties and relationships)
ROADrecon gather executed in 17.08 seconds and issued 1258 HTTP requests.
```# Credits
- For the write-up: [TokenSmith – Bypassing Intune Compliant Device Conditional Access by JUMPSEC](https://labs.jumpsec.com/tokensmith-bypassing-intune-compliant-device-conditional-access/)
- For discovery and sharing:
- TEMP43487580 (@TEMP43487580)
- Presentation: https://i.blackhat.com/EU-24/Presentations/EU-24-Chudo-Unveiling-the-Power-of-Intune-Leveraging-Intune-for-Breaking-Into-Your-Cloud-and-On-Premise.pdf
- Pytune tool: https://github.com/secureworks/pytune
- Dirk-jan, (@_dirkjan)