Exploiting Jenkins CVE-2024-23897 - Remote Code Execution Step-by-Step Tutorial
Fuzzing_in - Hardik Shah via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a step-by-step tutorial on exploiting the Jenkins Remote Code Execution vulnerability CVE-2024-23897. Learn to set up a vulnerable environment using Vulhub, utilize Nuclei for scanning, and execute the exploit to gain remote code execution on a target Jenkins server. Gain insights into cybersecurity defenses and ethical hacking practices while understanding the critical nature of this security flaw. Use tools like Nuclei and Vulhub to enhance your knowledge of web application vulnerabilities. Remember to practice ethical hacking and only test on authorized systems. Access additional resources, including GitHub repositories for Nuclei and Vulhub, and explore more cybersecurity content through provided links and playlists.
Syllabus
Exploiting Jenkins CVE-2024-23897: Remote Code Execution | Step-by-Step Tutorial
Taught by
Fuzzing_in - Hardik Shah