Offensively Groovy

22-10-2024

On a recent red team engagement, I was able to compromise the Jenkins admin user via retrieving the necessary components and decrypting credentials.xml. From here, I wanted to investigate Groovy, as it’s something I’ve never really used—this blog covers a bunch of post-exploitation tasks in Groovy.

$ open --where=trustedsec.com
# full write-up, post-ex tasks in Groovy
 Offensively Groovy