hacktricks/pentesting/8089-splunkd.md

18 lines
371 B
Markdown
Raw Normal View History

2020-11-06 00:32:50 +00:00
# 8089 - Splunkd
**Default port:** 8089
```text
PORT STATE SERVICE VERSION
8089/tcp open http Splunkd httpd
```
In the following page you can find an explanation how this service can be abused to escalate privileges and obtain persistence:
{% page-ref page="../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md" %}
### Shodan
* `Splunk build`