You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -147,7 +147,7 @@ Please refer to the [Wiki](https://github.com/mlcsec/Graphpython/wiki) for the f
147
147
***Get-ConditionalAccessPolicy** - Get conditional access policy properties
148
148
***Get-Application** - Get Enterprise Application details for app (NOT object) ID
149
149
***Get-ServicePrincipal** - Get Service Principal details
150
-
***Get-ServicePrincipalAppRoleAssignments** - Get Service Principal app role assignments
150
+
***Get-ServicePrincipalAppRoleAssignments** - Get Service Principal app role assignments (shows available admin consent permissions that are already granted)
151
151
***Get-PersonalContacts** - Get contacts of the current user
152
152
***Get-CrossTenantAccessPolicy** - Get cross tenant access policy properties
153
153
***Get-PartnerCrossTenantAccessPolicy** - Get partner cross tenant access policy
@@ -397,7 +397,7 @@ Assign a privileged role via template ID to a user or group and define permissio
397
397
398
398
### Spoof-OWAEmailMessage
399
399
400
-
Send emails using a compromised user's Outlook mail box. The --id parameter can be used to send emails as other uses within the organistion.
400
+
Send emails using a compromised user's Outlook mail box. The --id parameter can be used to send emails as other users within the organistion.
401
401
402
402
> Mail.Send permission REQUIRED for --id spoofing
403
403
@@ -601,6 +601,7 @@ Graph permission IDs applied to objects can be easily located with detailed expl
601
601
-[x]`Get-DeviceConfigurationPolicies` - tidy up the templateReference and assignmentTarget output
602
602
-[x]`Add-ApplicationPermission` - updated logic and added ability to grant admin consent for admin permissions assigned from the same command - update `Grant-AppAdminConsent` to handle any failures so users don't have to repeat this whole command again
603
603
- New:
604
+
-[x]`Find-PrivilegedApplications` - identify enterprise applications which have
604
605
-[x]`Grant-AppAdminConsent` - grant admin consent for requested/applied admin app permissions (if `Add-ApplicationPermission` fails)
605
606
-[x]`Backdoor-Script` - first user downloads target script content then adds their malicious code, supply updated script as args, encodes then [patch](https://learn.microsoft.com/en-us/graph/api/intune-shared-devicemanagementscript-update?view=graph-rest-beta)
606
607
-[ ]`Deploy-MaliciousWin32App` - use IntuneWinAppUtil.exe to package the EXE/MSI and deploy to devices
["Get-Application", "Get Enterprise Application details for app (NOT object) ID (--id)"],
80
-
["Get-ServicePrincipal", "Get Service Principal details (--id)"],
81
-
["Get-ServicePrincipalAppRoleAssignments", "Get Service Principal app role assignments (--id)"],
80
+
["Get-AppServicePrincipal", "Get details of the application's service principal from the app ID (--id)"],
81
+
["Get-ServicePrincipal", "Get all or specific Service Principal details (--id)"],
82
+
["Get-ServicePrincipalAppRoleAssignments", "Get Service Principal app role assignments (shows available admin consent permissions that are already granted)"],
82
83
["Get-PersonalContacts", "Get contacts of the current user"],
0 commit comments