mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-16 23:01:43 -08:00
translate 2
This commit is contained in:
@@ -414,4 +414,3 @@ println(hudson.util.Secret.decrypt("{...}"))
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -96,4 +96,3 @@ According to [**the docs**](https://www.jenkins.io/blog/2019/02/21/credentials-m
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -107,4 +107,3 @@ The example curl command provided demonstrates how to make a request to Jenkins
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -91,4 +91,3 @@ for (c in creds) {
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -41,4 +41,3 @@ If you can access the configuration file of some pipeline configured you could j
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -38,4 +38,3 @@ If you are not executing a reverse shell but a simple command you can **see the
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -65,4 +65,3 @@ msf> use exploit/multi/http/jenkins_script_console
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user