TokenSmith is a powerful tool designed to generate Entra ID access and refresh tokens, catering to offensive engagements such as adversary simulations, penetration testing, or even administrative tasks.
Built with operational security (OpSec) in mind, TokenSmith is compatible with popular Azure offensive tools and provides flexibility for various use cases.
--intune-bypass flag.TokenSmith can be installed by building it from source or using pre-built binaries available in its release directory. To build from source:
git clone https://github.com/jumpseclabs/tokensmith.git
cd tokensmith
go get .
go build -o tokensmith main.go For Windows, use GOOS=windows go build -o tokensmith.exe main.go.
Authorization Code Flow
./tokensmith authcode with optional flags for client ID, resource, or redirect URI.Intune Bypass
To bypass Intune Conditional Access, add the --intune-bypass flag to the authcode command.
Refresh Token Flow
Use an existing refresh token to obtain new tokens:
./tokensmith reftoken -r REFRESH_TOKEN [flags] TokenSmith prioritizes OpSec by enabling flexible authentication methods without requiring risky binary execution on critical devices. Authentication can occur on a separate device, minimizing exposure.
Future updates aim to include:
TokenSmith is an indispensable tool for professionals seeking efficient Entra ID token management while maintaining robust OpSec practices.
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…