Screenshots from the blog posts
Summary
In this post, we will see the usage of a path traversal exploit against Splunk Enterprise on a Windows environment. We will also understand how the exploit script works and see how to use it against one or more targets to steal the contents of the passwd file from the vulnerable hosts.
Description
Tags
Comments (0)