mirror of
https://github.com/carlospolop/hacktricks
synced 2024-12-03 09:59:40 +00:00
498 B
498 B
8089 - Pentesting Splunkd
Default port: 8089
PORT STATE SERVICE VERSION
8089/tcp open http Splunkd httpd
In the following page you can find an explanation how this service can be abused to escalate privileges and obtain persistence:
{% content-ref url="../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md" %} splunk-lpe-and-persistence.md {% endcontent-ref %}
Shodan
Splunk build