Day 12

Defence in depth Sleighing Threats, One Layer at a Time

Learning Objectives

  • Defence in Depth

  • Basic Endpoint Hardening

  • Simple Boot2Root Methodology

We are dealing with a server that is vulnerable by design. It contains misconfigurations and has been implemented with poor or simply nonexistent security practices.

Jenkins Dashboard without authentication
Access to Scrip Console allowing RCE and hence Reverse Shell

Successfull Reverse Shell

The (ALL :ALL) ALL line in the output essentially says that all commands can be performed by tracy using sudo. This means that the user is created with inherently privileged access. As such, we can just enter the command sudo su, and we're root!

Jenkins after fixing config file.

Last updated

Was this helpful?