Stuck in Tutorial Hell? Learn Backend Dev the Right Way
Lead AI-Native Products with Microsoft's Agentic AI Program
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a practical approach to hacking an enterprise in this 26-minute conference talk from DerbyCon 4. Dive into the world of cybersecurity as speakers Yasuo Saurabh Harit and S present "Gone in 60 minutes." Learn about various attack vectors, including exploiting Tomcat servers and Jenkins instances. Discover the challenges of password extraction and gain insights into future developments in enterprise hacking. Follow along with the presenters as they discuss scenarios, problems, and solutions, complete with flowcharts and source code examples. Gain valuable knowledge about potential vulnerabilities and how to address them in this informative and concise presentation.
Syllabus
Introduction
Scenario
The Problem
Where do shells come from
Who doesnt love tomcat
Hudson Jenkins
Code
Whats out there
Exploit
Flowchart
Source Code
Wiki Page
Challenges
Password Extraction
Future Development
Questions
Cutdown version