This post is a write-up of an infosec journey focusing on exploiting a medium-difficulty Linux machine with a vulnerable Jenkins instance. It covers the enumeration, exploitation, and privilege escalation steps to gain root access on the host machine. The post emphasizes the importance of using guided mode and write-ups to
Sort: