Splunk
Splunk exploitation
Discovery/Footprinting
The Splunk web server runs by default on port 8000. On older versions of Splunk, the default credentials are admin:changeme

If the default credentials do not work, it is worth checking for common weak passwords such as admin, Welcome, Welcome1, Password123, etc.
Enumeration
The Splunk Enterprise trial converts to a free version after 60 days, which doesn’t require authentication.
Abusing Built-In Functionality
See OffShore WU
Reverse shell

Windows
run.ps1
.bat file



Linux
Edit the rev.py Python script before creating the tarball and uploading the custom malicious app
CVE-2024-36991 - Read /etc/passwd
Exploit
SplunkResources
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Last updated
