In this chapter, we learned about Jenkins and its basic terminology. We covered how to detect the installation of Jenkins manually, as well as by using the Metasploit Framework. Then, we learned how to exploit Jenkins, as well as how the exploit works. Understanding how these exploits work is important if you wish to help the company you're working to apply better patches and have a pentester develop better exploits or bypasses.
Our main goal should always be to learn as much as we can about technology. From a pentester's perspective, the more they know, the greater their chances are of being able to exploit, and from a blue teams/SOC team's perspective, more information about the technology they have installed helps them prevent attacks being performed on it.
In the next chapter, we will look at exploiting bugs in the application logic.