2021-11-30 16:46:07 +00:00
|
|
|
# 8089 - Pentesting Splunkd
|
2020-11-06 00:32:50 +00:00
|
|
|
|
2021-11-30 16:46:07 +00:00
|
|
|
**Default port:** 8089
|
2020-11-06 00:32:50 +00:00
|
|
|
|
2021-10-18 11:21:18 +00:00
|
|
|
```
|
2020-11-06 00:32:50 +00:00
|
|
|
PORT STATE SERVICE VERSION
|
|
|
|
8089/tcp open http Splunkd httpd
|
|
|
|
```
|
|
|
|
|
|
|
|
In the following page you can find an explanation how this service can be abused to escalate privileges and obtain persistence:
|
|
|
|
|
2021-10-18 11:21:18 +00:00
|
|
|
{% content-ref url="../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md" %}
|
|
|
|
[splunk-lpe-and-persistence.md](../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md)
|
|
|
|
{% endcontent-ref %}
|
2020-11-06 00:32:50 +00:00
|
|
|
|
|
|
|
### Shodan
|
|
|
|
|
|
|
|
* `Splunk build`
|