hacktricks/pentesting/8089-splunkd.md

487 B

8089 - Splunkd

**Default port: **8089

PORT     STATE SERVICE VERSION
8089/tcp open  http    Splunkd httpd

In the following page you can find an explanation how this service can be abused to escalate privileges and obtain persistence:

{% content-ref url="../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md" %} splunk-lpe-and-persistence.md {% endcontent-ref %}

Shodan

  • Splunk build