Kali Linux - An Ethical Hacker's Cookbook: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition by Himanshu Sharma
Author:Himanshu Sharma [Sharma, Himanshu]
Language: eng
Format: azw3
Tags: COM043050 - COMPUTERS / Security / Networking, COM015000 - COMPUTERS / Security / Viruses and Malware, COM046070 - COMPUTERS / Operating Systems / Linux
Publisher: Packt Publishing
Published: 2019-03-29T00:00:00+00:00
pip install -r requirements.txt
The output of the preceding command is shown in the following screenshot:
The exploit requires us to have user credentials of the Jenkins running so, we will setup a vulnerable Jenkins environment locally with the credentials as shown below user1:user1:
Let's try to run the exploit against the Jenkins using the credentials we have. Run the following command:
python exploit.py --url http://192.168.2.11:8080 --job my-pipeline --username user1 --password user1 --cmd='cat /etc/passwd'
The output of running the preceding command is shown in the following screenshot:
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Access | Data Mining |
Data Modeling & Design | Data Processing |
Data Warehousing | MySQL |
Oracle | Other Databases |
Relational Databases | SQL |
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8261)
Azure Data and AI Architect Handbook by Olivier Mertens & Breght Van Baelen(6421)
Building Statistical Models in Python by Huy Hoang Nguyen & Paul N Adams & Stuart J Miller(6380)
Serverless Machine Learning with Amazon Redshift ML by Debu Panda & Phil Bates & Bhanu Pittampally & Sumeet Joshi(6270)
Data Wrangling on AWS by Navnit Shukla | Sankar M | Sam Palani(6045)
Driving Data Quality with Data Contracts by Andrew Jones(6009)
Learning SQL by Alan Beaulieu(5964)
Machine Learning Model Serving Patterns and Best Practices by Md Johirul Islam(5776)
Weapons of Math Destruction by Cathy O'Neil(5725)
Big Data Analysis with Python by Ivan Marin(5183)
Data Engineering with dbt by Roberto Zagni(4208)
Solidity Programming Essentials by Ritesh Modi(3845)
Time Series Analysis with Python Cookbook by Tarek A. Atwan(3695)
Pandas Cookbook by Theodore Petrou(3414)
Blockchain Basics by Daniel Drescher(3277)
Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2889)
Feature Store for Machine Learning by Jayanth Kumar M J(2800)
Learn T-SQL Querying by Pam Lahoud & Pedro Lopes(2782)
Mastering Python for Finance by Unknown(2734)
