You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -194,7 +194,7 @@ Please refer to the [Wiki](https://github.com/mlcsec/Graphpython/wiki) for the f
194
194
***Update-UserProperties** - Update a specific user property of the target user
195
195
***Add-ApplicationPassword** - Add client secret to target application
196
196
***Add-ApplicationCertificate** - Add client certificate to target application
197
-
***Add-ApplicationPermission** - Add permission to target application (application/delegated)
197
+
***Add-ApplicationPermission** - Add permission to target application e.g. Mail.Send and attempt to grant admin consent
198
198
***Add-UserTAP** - Add new Temporary Access Password (TAP) to target user
199
199
***Add-GroupMember** - Add member to target group
200
200
***Create-Application** - Create new enterprise application with default settings
@@ -598,9 +598,9 @@ Graph permission IDs applied to objects can be easily located with detailed expl
598
598
-[x]`Spoof-OWAEmailMessage` - add --email option containing formatted message as only accepts one line at the mo...
599
599
-[x]`Deploy-MaliciousScript` - add input options to choose runAsAccount, enforceSignatureCheck, etc. and more assignment options
600
600
-[x]`Get-DeviceConfigurationPolicies` - tidy up the templateReference and assignmentTarget output
601
-
-[]`Add-ApplicationPermission` - check logic to ensure existing perms aren't overridden
601
+
-[x]`Add-ApplicationPermission` - updated logic and added ability to grant admin consent for admin permissions assigned from the same command - update `Grant-AppAdminConsent` to handle any failures so users don't have to repeat this whole command again
602
602
- New:
603
-
-[ ]`Grant-AdminConsent` - grant admin consent for requested/applied admin app permissions
603
+
-[ ]`Grant-AppAdminConsent` - grant admin consent for requested/applied admin app permissions (if `Add-ApplicationPermission` fails)
604
604
-[x]`Backdoor-Script` - first user downloads target script content then adds their malicious code, supply updated script as args, encodes then [patch](https://learn.microsoft.com/en-us/graph/api/intune-shared-devicemanagementscript-update?view=graph-rest-beta)
605
605
-[ ]`Deploy-MaliciousWin32App` - use IntuneWinAppUtil.exe to package the EXE/MSI and deploy to devices
606
606
- check also [here](https://learn.microsoft.com/en-us/graph/api/resources/intune-app-conceptual?view=graph-rest-1.0) for managing iOS, Android, LOB apps etc. via graph
# - list-applications 'requiredResourceAccess' contains all the permission ids
3696
-
# can also check: https://graph.microsoft.com/v1.0/servicePrincipals/9ee251b0-b25e-4562-b62e-611c75387f2b/appRoleAssignments
3697
-
# - for the configured permission
3698
-
# CHECK
3699
-
# - one of above functions^^ kinda does this
3700
-
# - need to get the present perms and add to add-applicationpermissions json body like with add-applicationcertificate which checks for current certs so it doesn't override them
3701
-
3693
+
3702
3694
# add-applicationpermission
3703
-
# - create an new application (add-application) then assign this
3704
-
# - trying to assing to existing one will remove all the other perms
3705
-
# NEED todo dump-applicationpermissions
3706
-
# - then make sure you reassign the existing ones found from that in the following req
graphresource=next((resourceforresourceinexistingpermsifresource['resourceAppId'] =='00000003-0000-0000-c000-000000000000'), None) # does Microsoft Graph resource already exist
0 commit comments