Jenkins Attacks & Exploitation
Overview
Script Console Exploitation
Groovy Command Execution
Script Console Access
Basic Command Execution
Enhanced Command Execution Script
Linux System Exploitation
Information Gathering Scripts
File System Exploration
Credential and Secret Harvesting
Reverse Shell Establishment
Linux Reverse Shell Scripts
Advanced Persistent Shell
Windows System Exploitation
Windows Command Execution
Windows Reverse Shell
Build System Exploitation
Pipeline Manipulation
Malicious Pipeline Creation
Existing Pipeline Modification
Agent and Slave Exploitation
Agent Registration and Control
Known Vulnerability Exploitation
CVE-2018-1999002 & CVE-2019-1003000
Pre-Authentication RCE Exploitation
Jenkins 2.150.2 Node.js RCE
Job Creation Privilege Abuse
HTB Academy Lab Solutions
Lab 1: Jenkins RCE and Flag Retrieval
Step 1: Environment Setup and Authentication
Step 2: Script Console Access
Step 3: Command Execution via Groovy Script
Step 4: Flag Discovery and Retrieval
Step 5: Alternative Reverse Shell Method (if needed)
Step 6: Expected Flag Retrieval
Step 7: Verification and Documentation
π― HTB Academy Lab Summary
Post-Exploitation and Persistence
Jenkins Backdoor Installation
Persistent Script Console Access
Supply Chain Attack Preparation
Defense Evasion and Operational Security
Log Evasion Techniques
Jenkins Audit Log Manipulation
Anti-Detection Measures
Professional Assessment Integration
Jenkins Security Assessment Workflow
Discovery Phase
Exploitation Phase
Post-Exploitation Phase
Next Steps
Last updated