Главная
Study mode:
on
1
Intro
2
CI/CD PIPELINE
3
Jenkins in Numbers
4
Jenkins is useful!
5
Jenkins is Great!
6
Jenkins Integrations
7
Jenkins Needs Access to Secrets
8
Jenkins in the news: a complete takeover
9
Preliminary probing - JENKINS_HOME
10
Preliminary probing [2B]
11
Jenkins Script console
12
Shodan probing
13
probing summary
14
Jenkins access 2
15
Jenkins reverse engineering
16
Jenkins static code analysis
17
Code analysis summary
18
CVE 2018-1999043
19
Exploiting systematically
Description:
Explore the vulnerabilities in Jenkins, the popular open-source automation server, in this 53-minute conference talk from Hack In The Box Security Conference. Dive into the research process that uncovered six CVEs, focusing on two critical vulnerabilities that allow anonymous attackers to gain full admin privileges on Jenkins servers. Learn about the code reverse-engineering techniques used to discover these security flaws and the exploitation methods that can compromise entire Jenkins infrastructures. Gain insights into the importance of Jenkins in DevOps stacks of major organizations and understand the potential impact of these vulnerabilities on software delivery processes. Follow along as the speaker details the step-by-step approach to probing, analyzing, and exploiting Jenkins, providing valuable knowledge for cybersecurity professionals and DevOps engineers alike.

Hacking the DevOps Butler - From Nothing to Admin

Hack In The Box Security Conference
Add to list
0:00 / 0:00