Hacking Jenkins

Hacking Jenkins

Hack In The Box Security Conference via YouTube Direct link

Common attack vectors

6 of 19

6 of 19

Common attack vectors

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Jenkins

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Orange Tsai
  3. 3 Outline
  4. 4 JVM ecosystem report 2018
  5. 5 Jenkins for hackers
  6. 6 Common attack vectors
  7. 7 Past deserialization bugs on Jenkins
  8. 8 Jenkins remoting 2.55
  9. 9 Review Java web
  10. 10 What did Stapler do?
  11. 11 Routing rules
  12. 12 URL whitelists by default
  13. 13 compile-time Meta-Programming
  14. 14 Root cause analysis
  15. 15 Prepare the malicious JAR
  16. 16 Attacking remote Jenkins!
  17. 17 Survey on Shodan
  18. 18 Evolution of the exploit
  19. 19 More reliable exploit chain

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.