Exploiting Jenkins CVE-2024-23897 - Remote Code Execution Step-by-Step Tutorial
Offered By: Fuzzing_in - Hardik Shah via YouTube
Course Description
Overview
Explore a step-by-step tutorial on exploiting the Jenkins Remote Code Execution vulnerability CVE-2024-23897. Learn to set up a vulnerable environment using Vulhub, utilize Nuclei for scanning, and execute the exploit to gain remote code execution on a target Jenkins server. Gain insights into cybersecurity defenses and ethical hacking practices while understanding the critical nature of this security flaw. Use tools like Nuclei and Vulhub to enhance your knowledge of web application vulnerabilities. Remember to practice ethical hacking and only test on authorized systems. Access additional resources, including GitHub repositories for Nuclei and Vulhub, and explore more cybersecurity content through provided links and playlists.
Syllabus
Exploiting Jenkins CVE-2024-23897: Remote Code Execution | Step-by-Step Tutorial
Taught by
Fuzzing_in - Hardik Shah
Related Courses
Authentication & Authorization: OAuthUdacity Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Hacking and Patching
University of Colorado System via Coursera Fundamentals of Computer Network Security
University of Colorado System via Coursera