Building A Red Team Cyber Range Lab | Creating Jenkins Weakness

preview_player
Показать описание
This is the 12th video into the Building Red Team Cyber Range series of videos.

In this video, I provide a brief background about the Continuous Integration platform Jenkins, some of the weaknesses you can find on a red team or penetration testing engagements. I then walked through the installation process, intentionally misconfigured access control and demonstrated how a red teamer, penetration tester or an adversary can leverage such misconfiguration for a remote code execution on the Jenkins server

-~-~~-~~~-~~-~-
Check out my playlists:

-~-~~-~~~-~~-~-
Рекомендации по теме
Комментарии
Автор

Wow... I have a lot to learn in this Cybersecurity industry. God help me.

HabeebSongstaAdebisi