This post is a write-up of an infosec journey focusing on exploiting a medium-difficulty Linux machine with a vulnerable Jenkins instance. It covers the enumeration, exploitation, and privilege escalation steps to gain root access on the host machine. The post emphasizes the importance of using guided mode and write-ups to

2m read timeFrom systemweakness.com
Post cover image
Table of contents
Buider HTB Write-upINTRODUCTIONENUMERATION

Sort: