Considering Nexus Auditor? You Should, But Know These Things First

I field a flood of requests every week asking to learn more about Nexus Auditor. I get it. Nexus Auditor, in the right use case, is a solid, cost-effective solution. Is Nexus ...

Workflow Automation: Publishing Artifacts to Nexus Repository using Jenkins Pipelines

In this guide, we will use Jenkins as a Continuous Integration server and Nexus Repository as a build repository. The goal of this guide is to create a workflow where we can ...
Open Source Sucks, Says Ballsy Infosec Firm

Open Source Sucks, Says Ballsy Infosec Firm

Security bugs are exploding in open source software, claims a vulnerability management service ...
Security Boulevard

How to Publish Docker Images on a Private Nexus Repository Using Jib Maven Plugin

How to create a Nexus repository manager using HTTP and how to set up a Docker repository to publish Docker images using the jib plugin. In this exercise, we are going to ...

Managing Nexus API Using Jenkins X

In my last post, Jenkins X — Managing Jenkins, I talked about how we manage our Jenkins server. This time around, I’ll be looking at the Nexus server and how it too ...

Nexus Intelligence Insights CVE-2020-2100: Jenkins – UDP Amplification Reflection Attack Leading to Distributed Denial of Service (DDoS)

In the wake of the serious Jenkins vulnerability impacting at least 12,000 Jenkins servers, we dedicate February’s Nexus Intelligence Insights to helping you solve it. This vulnerability is clever; it opens up ...

How to Publish Java Artifacts to Nexus Using Jenkins and Maven

In this article we are going to explore how you can publish your Java artifacts (.ear, .jar, .war) to Nexus 3 using Jenkins and Maven.For this I have created a docker compose ...

Identifying Security Vulnerabilities Inside a Jenkins Pipeline

What’s the best approach to secure vulnerabilities inside a Jenkins pipeline? Surprisingly, scale isn’t a consideration. Good security practices work whether you are talking about a personal project or an enterprise solution ...

Jenkins – CVE-2018-1000600 PoC

| | DEVOPS, jenkins, pentesting
second exploit from the blog posthttps://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.htmlChained with CVE-2018-1000600 to a Pre-auth Fully-responded SSRFhttps://jenkins.io/security/advisory/2018-06-25/#SECURITY-915This affects the GitHub plugin that is installed by default. However, I learned that when you spin up a new ...
Jenkins - decrypting credentials.xml

Jenkins – decrypting credentials.xml

| | jenkins, pentesting
If you find yourself on a Jenkins box with script console access you can decrypt the saved passwords in credentials.xml in the following way:hashed_pw='$PASSWORDHASH'passwd = hudson.util.Secret.decrypt(hashed_pw)println(passwd)You need to perform this on the ...