Skip to content

Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy

Notifications You must be signed in to change notification settings

zh54321/PoCEntraDeviceComplianceBypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

POCEntraDeviceComplianceBypass

A Conditional Access Policy in Entra ID which only require a compliant device can be bypassed using Intune Portal client ID and a special redirect URI.

Note that any other Conditional Access Policies and conditions you’ve configured in your tenant will still apply!

How To

  1. Execute the script.

  2. Open the Browser Developer tools and authenticate normally.

  3. After clicking on "Continue" you should see an error message in the Browser console:

image

  1. Click on the URL in the Browser console (ms-appx-web://...) this will open the URL in a new tab. Copy the content of the code parameter into the script window. This will get you an access and refresh token (stored in $token):

image

The refresh token can, for example, be used to obtain an access token for Azure AD Graph (scope: user_impersonation) for example using https://github.com/zh54321/EntraTokenAid.git

image

Or to run ROADrecon (https://github.com/dirkjanm/ROADtools) to enumerate the whole tenant:

roadtx gettoken --refresh-token $tokens.refresh_token -c 9ba1a5c7-f17a-4de9-a1f1-6178c8d51223
Requesting token for resource https://graph.windows.net
Tokens were written to .roadtools_auth
PS C:\Tools\EntraTokenAid> roadrecon gather
Starting data gathering phase 1 of 2 (collecting objects)
Starting data gathering phase 2 of 2 (collecting properties and relationships)
ROADrecon gather executed in 17.08 seconds and issued 1258 HTTP requests.

Credits

About

Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy

Topics

Resources

Stars

Watchers

Forks