Kali Linux - An Ethical Hacker's Cookbook: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition by Himanshu Sharma

Kali Linux - An Ethical Hacker's Cookbook: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition by Himanshu Sharma

Author:Himanshu Sharma [Sharma, Himanshu]
Language: eng
Format: azw3
Tags: COM043050 - COMPUTERS / Security / Networking, COM015000 - COMPUTERS / Security / Viruses and Malware, COM046070 - COMPUTERS / Operating Systems / Linux
Publisher: Packt Publishing
Published: 2019-03-29T00:00:00+00:00


pip install -r requirements.txt

The output of the preceding command is shown in the following screenshot:

The exploit requires us to have user credentials of the Jenkins running so, we will setup a vulnerable Jenkins environment locally with the credentials as shown below user1:user1:

Let's try to run the exploit against the Jenkins using the credentials we have. Run the following command:

python exploit.py --url http://192.168.2.11:8080 --job my-pipeline --username user1 --password user1 --cmd='cat /etc/passwd'

The output of running the preceding command is shown in the following screenshot:



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.