How to Find MFA Bypasses in Conditional Access Policies

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 36

  • @meazer
    @meazer 2 года назад +4

    great video. very well-condensed and no needless tangents. so many other people would've made this video 30 mins long. this is perfect, keep it up.

  • @jmesweeney
    @jmesweeney Год назад +5

    Very informative video. I'm 100% going to be replicating this / testing a couple of scenarios myself. Thank you for sharing this knowledge 👍 Keep up the good work!

  • @michaelwaterman3553
    @michaelwaterman3553 2 года назад +2

    Wow, this is great info! Going to share with my team on Monday. Big thanks!

  • @owensben
    @owensben 2 года назад +2

    Very well presented and straight to points with demos, nice work!
    Shows the importance of a policy which blocks access all operating systems but allows connections from operating systems which you supported, such as iOS, Android, Windows and MacOS. Like the tools you showed and thanks for sharing.
    Subscribed.

  • @PaulLinger
    @PaulLinger 2 года назад +2

    This is a great video. Appreciate you creating the tool, will def be leveraging tomorrow morning lol.

  • @melonscratcher
    @melonscratcher 2 года назад +1

    Hey Beau - Great video! First time I watched your content and I do like it a lot! Skills to pay the bills, keep it rolling. SUBSCRIBED !!!

  • @cgaz9088
    @cgaz9088 2 года назад +1

    Great video, great tool, a great addition to my toolbox! Thanks for the hard work

  • @SumanRoy.official
    @SumanRoy.official Год назад +1

    Wonderful video, totally an uncommon topic , subbed

  • @michaelrogers2011
    @michaelrogers2011 Год назад

    Solid breakdown, thanks Beau.

  • @user-eu2yf6ij2t
    @user-eu2yf6ij2t 2 года назад +3

    Yeah, I'm gonna need nobandwidth intro music bro ;)

  • @user-ty3iy8bk2l
    @user-ty3iy8bk2l Год назад

    Amazing video. Exactly what I was looking for.
    Subbed

  • @ajmaddox1540
    @ajmaddox1540 Год назад +1

    Beau - the account that was 'compromised' for your example and that you utilized to do your MFA sweep -- was it elevated at all? any admin permission roles?

  • @eslamkamal1704
    @eslamkamal1704 2 года назад +1

    Great content as usual 👏👏
    what is the best way to perform OPSEC during Azure Pentesting for example!!

  • @nattsvart199
    @nattsvart199 Год назад

    Great video. Please do more mfa hacking and protecting.

  • @MrJoeyverlinden
    @MrJoeyverlinden 2 года назад +2

    Can't find the device emulation mode in my (fully patched) Edge browser. How did you open it? 🤔

  • @LukePWilkinsVids
    @LukePWilkinsVids Год назад

    Brilliant information! Thank you

  • @GisselleGuzman-pk8ui
    @GisselleGuzman-pk8ui Год назад

    hehehhe it's WORKING!! :) THANKS!! for creating this powershell script ..liked and subscribed

  • @hullan666
    @hullan666 8 месяцев назад

    Hi! I have built some CA policies that I'm pretty sure are watertight but just wanted to check with this script. However, I get a "Login appears to have failed" on almost all the logins? The Graph API and the Azure mgmt API are the two only ones that give me the green text with "the response indicates MFA is in use"

  • @patrick__007
    @patrick__007 2 года назад

    A great video. Thanks voor sharing.

  • @prisa1590
    @prisa1590 2 года назад +1

    Very interesting! Nice video.

  • @Zachsnotboard
    @Zachsnotboard 9 месяцев назад

    so if you were to use -UsersPermissionToReadOtherUsersEnabled FALSE , would this keep tools like MFA sweep from getting this info ?

  • @australiansango
    @australiansango 2 года назад +1

    Great video.

  • @MichaelToub
    @MichaelToub Год назад

    Great Video!!

  • @BVey-tt6wl
    @BVey-tt6wl Год назад

    What privileges did the (breached) account hold?

  • @vicariousphoto
    @vicariousphoto 2 года назад +1

    Spreadin them sheets 😎

  • @patrick__007
    @patrick__007 2 года назад

    Can you do this in bulk? Instead per user per group per instance

  • @iamshubhamswaraj
    @iamshubhamswaraj Год назад

    I want to bypass MFA under trusted IP network. Set conditional access policy and added my IP as trusted ip still facing the MFA prompt.

  • @socbrian
    @socbrian 2 года назад

    Thanks for the video and tool. What if the company uses a federation service like Ping/Okta, I assume your tool wouldn't support that as the fields to stuff username / password would be different than MS's login screens

    • @wunderwuzzi3113
      @wunderwuzzi3113 2 года назад +1

      Common misconfig includes ROPC working (e.g. MFA enforced at identity provider, but not in AAD) - so ROPC attack works and AAD gives out access token.

    • @anonymous-zi1pw
      @anonymous-zi1pw Год назад

      hi bro, did you get how to authenticate mfa? i need help

  • @arjanvanveen3312
    @arjanvanveen3312 Год назад

    Is there a way to bypass my antivirus? This script contains malicious content and has been blocked by your antivirus software.

  • @nmelanson75
    @nmelanson75 Год назад

    Does not work for me for Import I get a The ampersand (&) character is not allowed.

  • @Boolap1337
    @Boolap1337 2 года назад

    Cool

  • @lewiskelly14
    @lewiskelly14 2 года назад

    The title should be clearer that this is for cloud and doesn't apply to Windows Server