This post is a write-up of an infosec journey focusing on exploiting a medium-difficulty Linux machine with a vulnerable Jenkins instance. It covers the enumeration, exploitation, and privilege escalation steps to gain root access on the host machine. The post emphasizes the importance of using guided mode and write-ups to accelerate progress and gain a better understanding of vulnerabilities and misconfigurations.

2m read timeFrom systemweakness.com
Post cover image
Table of contents
Buider HTB Write-upINTRODUCTIONENUMERATION

Sort: