| Lab/Room | TryHackMe - Advanced Pentesting |
|---|---|
| Type | Challenge |
| Statut | Done |
| Date | 15/03/2026 |
The objective of this room is to exploit a misconfigured Jenkins instance to gain an initial foothold, and then escalate privileges on a Windows system by abusing authentication tokens.
This lab highlights two key real-world attack paths:
The first step consists of performing a full port scan to identify exposed services:
nmap-A-p-10.130.155.102--min-rate10000-Pn
The scan reveals three open ports:
Accessing port 8080 exposes a Jenkins login panel. Since Jenkins is often misconfigured, checking default credentials is a common and effective approach.
A quick search suggests default credentials:
adminadminThis works, giving full access to the Jenkins dashboard.