Главная
Study mode:
on
1
Intro
2
Orange Tsai
3
Outline
4
JVM ecosystem report 2018
5
Jenkins for hackers
6
Common attack vectors
7
Past deserialization bugs on Jenkins
8
Jenkins remoting 2.55
9
Review Java web
10
What did Stapler do?
11
Routing rules
12
URL whitelists by default
13
compile-time Meta-Programming
14
Root cause analysis
15
Prepare the malicious JAR
16
Attacking remote Jenkins!
17
Survey on Shodan
18
Evolution of the exploit
19
More reliable exploit chain
Description:
Explore the intricacies of hacking Jenkins, the world's most popular CI/CD server, in this comprehensive conference talk from Hack In The Box Security Conference. Dive deep into Jenkins' internal mechanisms and exploitation guidelines, covering dynamic routing misuse, meta-programming abuse, and Groovy sandbox escapes. Learn about a full pre-auth remote code execution exploit chain and discover seven newly found vulnerabilities with CVEs. Gain insights into building custom gadgets and unconventional hacking techniques for Jenkins. Topics covered include JVM ecosystem reports, common attack vectors, past deserialization bugs, Jenkins remoting, Java web review, Stapler's role, routing rules, URL whitelists, compile-time meta-programming, root cause analysis, malicious JAR preparation, remote Jenkins attacks, Shodan survey results, and the evolution of exploit chains.

Hacking Jenkins

Hack In The Box Security Conference
Add to list
0:00 / 0:00