Skip to content

Commit 0d38cd3

Browse files
authored
Merge pull request #1 from DefensiveOrigins/main
update README
2 parents 3610923 + 009a002 commit 0d38cd3

File tree

1 file changed

+31
-4
lines changed

1 file changed

+31
-4
lines changed

README.md

Lines changed: 31 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,36 +7,57 @@ This repository contains two helper scripts for inspecting Jenkins instances:
77

88
Only run these scripts against systems you own or have explicit permission to test.
99

10+
## Install from PIP:
11+
12+
```
13+
pip install jenkinsenvhunter
14+
```
15+
16+
Then:
17+
18+
```
19+
jenkins-env-hunter --help
20+
jenkins-check-noauth --help
21+
```
22+
1023
## Requirements
1124

1225
- Python 3.7+
1326
- `requests` (required)
1427
- `alive-progress` (optional, progress bars)
1528

16-
Install dependencies:
29+
30+
31+
32+
## Install dependencies (if from git clone)
33+
1734
```
1835
pip install requests alive-progress
1936
```
2037

2138
---
2239

23-
## CheckNoAuth.py
40+
## CheckNoAuth.py & jenkins-check-noauth
2441

2542
Purpose: quickly determine which hosts are running Jenkins and whether anonymous access is allowed. The script can also extract hosts from Nessus `.nessus` exports (plugin 65054).
2643

27-
Usage examples
44+
Usage examples (Python and PIP versions listed)
2845
```
2946
# Scan hosts listed in hosts.txt using HTTP
3047
python CheckNoAuth.py -f hosts.txt
48+
jenkins-check-noauth -f hosts.txt
3149
3250
# Scan hosts using HTTPS and 4 threads
3351
python CheckNoAuth.py -f hosts.txt --ssl -n 4
52+
jenkins-check-noauth -f hosts.txt --ssl -n 4
3453
3554
# Extract Jenkins hosts from a Nessus export and scan them
3655
python CheckNoAuth.py -x scan.nessus
56+
jenkins-check-noauth -x scan.nessus
3757
3858
# Verbose output for troubleshooting a single host
3959
python CheckNoAuth.py -f single-host.example.local:8080 -v
60+
jenkins-check-noauth -f single-host.example.local:8080 -v
4061
```
4162

4263
Options summary
@@ -60,23 +81,27 @@ Output
6081

6182
---
6283

63-
## JenkinsEnvHunter.py
84+
## JenkinsEnvHunter.py & jenkins-env-hunter
6485

6586
Purpose: enumerate Jenkins jobs and builds and fetch environment variables. Finds likely sensitive variables by default (regex matching `user|pass|key|auth|token|secret`) and can save results to a file.
6687

6788
Usage examples
6889
```
6990
# Scan a Jenkins instance (no auth) and print findings to console
7091
python JenkinsEnvHunter.py --url http://jenkins.example.local/
92+
jenkins-env-hunter --url http://jenkins.example.local/
7193
7294
# Scan and save results to a file
7395
python JenkinsEnvHunter.py --url http://jenkins.example.local/ --output findings.txt
96+
jenkins-env-hunter --url http://jenkins.example.local/ --output findings.txt
7497
7598
# Scan using credentials (authenticated Jenkins)
7699
python JenkinsEnvHunter.py --url https://jenkins.example.local/ --user alice --token myapitoken --output findings.txt
100+
jenkins-env-hunter --url https://jenkins.example.local/ --user alice --token myapitoken --output findings.txt
77101
78102
# Include all environment variables (not only flagged ones)
79103
python JenkinsEnvHunter.py --url http://jenkins.example.local/ --all
104+
jenkins-env-hunter --url http://jenkins.example.local/ --all
80105
```
81106

82107
Options summary
@@ -108,11 +133,13 @@ Notes
108133
1. Discover potentially anonymous Jenkins servers:
109134
```
110135
python CheckNoAuth.py -f hosts.txt -n 8
136+
jenkins-check-noauth -f hosts.txt -n 8
111137
```
112138

113139
2. For a discovered server that allows anonymous access, run a targeted environment scan:
114140
```
115141
python JenkinsEnvHunter.py --url http://jenkins.example.local/ --output scan_report.txt
142+
jenkins-env-hunter --url http://jenkins.example.local/ --output scan_report.txt
116143
```
117144

118145
---

0 commit comments

Comments
 (0)