Splunkd - Port 8089
Basic info
What is Splunk?
Splunk Architecture
Splunk Components
Splunk Deployment Models
Default Ports
Reconnaissance & Enumeration
Port Scanning
Service Fingerprinting
Shodan Queries
Web Interface Enumeration
Vulnerability Analysis
1. Free Version - No Authentication
2. Default Credentials
3. Credential Brute Force
Remote Code Execution (RCE)
Method 1: Custom Splunk App with Scripted Inputs
Method 2: Using Pre-Made Exploit
Method 3: Splunk Search Command Injection
Method 4: REST API Command Execution
Method 5: Metasploit Modules
Data Exfiltration
Search Sensitive Data
Export Data
List and Download Apps
Privilege Escalation
Local Privilege Escalation (Linux)
Windows Privilege Escalation
Persistence
Backdoor User Creation
Persistent App Backdoor
Scheduled Search Backdoor
Post-Exploitation
Credential Extraction
Lateral Movement
Defense & Hardening
Secure Installation
Authentication & Access Control
Network Security
Monitoring & Detection
Regular Security Audits
Update & Patch
Tools & Scripts
Essential Tools
SplunkWhisperer (Automated Exploitation)
Custom Enumeration Script
Cheat Sheet
Quick Reference
Important Files
Common Endpoints
Conclusion
Additional Resources
Last updated