- Notifications
You must be signed in to change notification settings - Fork 16
Updates
mc edited this page Jul 24, 2024 · 1 revision
New commands:
Backdoor-Script: Patches an existing device management script with malicious codeDeploy-MaliciousWeblink: Deploys a malicious Windows web link app to all devicesAdd-ApplicationCertificate: Similar toAdd-ApplicationPasswordexcept adds a x509 cert (public key) to the compromised app (can then use the .pfx to auth as the app service principal)Update-UserProperties: Updates specific user properties, potentially allowing privileged access via dynamic groupsAdd-ApplicationPermission: Assigns supplied permission to target or compromised applicationGrant-AppAdminConsent: Grants admin consent to assigned permissions (if necessary)Find-PrivilegedApplications: Identifies high-value enterprise applications with privileged permissions assignedDisplay-FirewallConfigPolicyRules: Identifies Intune endpoint security firewall configuration policy rulesDump-Win32Apps: Dumps all or specific Windows applications that have been deployed via IntuneDump-iOSApps: Dumps all or specific iOS applications that have been deployed via IntuneDump-macOSApps: Dumps all or specific macOS applications that have been deployed via IntuneDump-AndroidApps: Dumps all or specific Android applications that have been deployed via IntuneLocate-PermissionID: Searcher for the MS Graph API permissions referenceLocate-ObjectID: Identifies and displays information relating to unknown object IDs (user, group, app, device, SP)Update-DeviceConfig: Updates writable device configuration properties in Intune
Updated commands:
Spoof-OWAEmailMessage: Added the--emailoption for supplying formatted email body contentDeploy-MaliciousScript: RunAsAccount, EnforceSignatureCheck, and more script assignment options added to customise deploymentList-Applications&Get-Application: Now dynamically resolve Graph API app role IDs from theRequiredResourceAccessfieldInvoke-Search: Now highlights matched search terms in output