1
2
Fork 0
mirror of https://github.com/carlospolop/hacktricks.git synced 2023-12-14 19:12:55 +01:00
hacktricks/pentesting/8089-splunkd.md

19 lines
498 B
Markdown
Raw Normal View History

2021-11-30 17:46:07 +01:00
# 8089 - Pentesting Splunkd
2020-11-06 01:32:50 +01:00
2021-11-30 17:46:07 +01:00
**Default port:** 8089
2020-11-06 01:32:50 +01:00
```
2020-11-06 01:32:50 +01:00
PORT STATE SERVICE VERSION
8089/tcp open http Splunkd httpd
```
In the following page you can find an explanation how this service can be abused to escalate privileges and obtain persistence:
{% content-ref url="../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md" %}
[splunk-lpe-and-persistence.md](../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md)
{% endcontent-ref %}
2020-11-06 01:32:50 +01:00
### Shodan
* `Splunk build`