10.-Attacking-jenkins
1. Jenkins Version Detection
curl -I http://target:8080/nmap -sV -p 8080 <target_ip>curl http://target:8080/jenkins/cli/ | grep -i "Jenkins CLI"
2. Jenkins Port Enumeration
nmap -sV -p 8080,5000 <target_ip>
3. Jenkins CLI Enumeration
java -jar jenkins-cli.jar -s http://target:8080/jenkins/ helpjava -jar jenkins-cli.jar -s http://target:8080/jenkins/ list-pluginsjava -jar jenkins-cli.jar -s http://target:8080/jenkins/ list-jobs
4. Jenkins Plugin Enumeration
5. Jenkins Security Realm Enumeration
6. Jenkins API Enumeration
7. Jenkins Access Control Enumeration
8. Exploiting Jenkins Script Console
9. Exploiting Build Job Misconfigurations
10. Exploiting Pipeline Misconfigurations
11. Extracting Credentials from Jenkins
12. Persistence and Post-Exploitation
13. Unauthenticated Exploits (Public Jenkins)
14. Pipeline Script Injection (Groovy RCE)
15. Jenkins Slave Exploitation
16. Exploiting Misconfigured Webhooks
17. Jenkins SSRF & External Service Interaction
18. Jenkins Reverse Shell via Build Step Manipulation
19. Privilege Escalation via Misconfigured Agents
20. Arbitrary File Read via Plugin Vulnerabilities
Additional Exploitation Techniques
Last updated