enumeration
1. Discovery/Footprinting
1.1 Nmap Port Scan
sudo nmap -sV <target_ip> -p 8000,80891.2 Web Interface Access
1.3 Version Detection
2. Enumeration
2.1 Splunk Free Check
2.2 Web Interface Exploration
2.3 Scripted Inputs (RCE)
2.4 REST API (Port 8089)
2.5 Vulnerability Scanning
2.6 SSRF
2.7 Credential Brute-forcing
2.8 Splunk Log Extraction (if accessible)
2.9 Session Hijacking (If Cookies Leak)
2.10 Splunk Forwarder Abuse
3. Key Points
Last updated