Splunk


Splunk is a log analytics tool used to gather, analyze and visualize data. Though not originally intended to be a SIEM tool, Splunk is often used for security monitoring and business analytics. Splunk deployments are often used to house sensitive data and could provide a wealth of information for an attacker if compromised.

It was initially discovered that the target system is running an instance of Splunk 8.0.5 on the port 8089 over SSL Later, I was able to find the exact process as well

shaun@doctor:/opt$ ll
total 16
drwxr-xr-x  4 root   root   4096 Sep  6  2020 ./
drwxr-xr-x 20 root   root   4096 Sep 15  2020 ../
drwxrwxr-x  2 root   root   4096 Sep  7  2020 clean/
drwxr-xr-x  9 splunk splunk 4096 mär  9 11:51 splunkforwarder/

The /opt directory has a sub-directory that seems to be the home directory of the Splunk instance as the name suggests

shaun@doctor:/opt/splunkforwarder$ ll
total 180
drwxr-xr-x  9 splunk splunk  4096 mär  9 11:51 ./
drwxr-xr-x  4 root   root    4096 Sep  6  2020 ../
drwxr-xr-x  3 splunk splunk  4096 Sep  6  2020 bin/
-r--r--r--  1 splunk splunk    57 Jul  8  2020 copyright.txt
drwxr-xr-x 13 splunk splunk  4096 Sep 28  2020 etc/
drwxr-xr-x  2 splunk splunk  4096 Sep  6  2020 include/
drwxr-xr-x  5 splunk splunk  4096 Sep  6  2020 lib/
-r--r--r--  1 splunk splunk 85709 Jul  8  2020 license-eula.txt
drwxr-xr-x  3 splunk splunk  4096 Sep  6  2020 openssl/
-r--r--r--  1 splunk splunk   841 Jul  8  2020 README-splunk.txt
drwxr-xr-x  4 splunk splunk  4096 Sep  6  2020 share/
-r--r--r--  1 splunk splunk 50969 Jul  8  2020 splunkforwarder-8.0.5-a1a6394cc5ae-linux-2.6-x86_64-manifest
drwx--x---  6 root   root    4096 Sep  6  2020 var/

I am unable to read pretty much all the important files.

Then I realized that there is a web GUI. I was unable to proceed forward as some of these require authentication

Since I got a credential and was able to validate it by making a lateral movement, I will test for password reuse again here

I was able to log in using the credential of the shaun user. Password reuse is confirm here again.

The thing with Splunk is that once I know any valid credentials, you can abuse the Splunk service to execute a shell as the user running Splunk. If root is running it, I can escalate privileges to root.

Moving on Privilege Escalation