{"id":680,"date":"2020-07-28T19:16:35","date_gmt":"2020-07-28T19:16:35","guid":{"rendered":"https:\/\/zineausa.com\/blog\/?p=680"},"modified":"2020-07-28T19:27:13","modified_gmt":"2020-07-28T19:27:13","slug":"pen-test-guide-to-pentaho-business-analytics","status":"publish","type":"post","link":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/","title":{"rendered":"Pen Test Guide to Pentaho Business Analytics"},"content":{"rendered":"\n<p>This guide was written following a very confusing and multi-day ordeal to enumerate what was found in an instance of this software during a pen test. Hopefully this Pen Test Guide to Pentaho Business Analytics will help you if you run into it on your tests.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"668\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/black-samsung-tablet-computer-106344.jpg\" alt=\"\" class=\"wp-image-683\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/black-samsung-tablet-computer-106344.jpg 1000w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/black-samsung-tablet-computer-106344-300x200.jpg 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/black-samsung-tablet-computer-106344-768x513.jpg 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/black-samsung-tablet-computer-106344-600x401.jpg 600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>The summary of what this software does, is allows you to connect databases and visualize, change, and analyze the data on them. I&#8217;ve seen this used to pull sql queries, clean databases, etc. You can think of it as an automation tool for databases and their analytics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Getting access to the tool: (Pray for default credentials\/settings):<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"554\" height=\"677\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-3.png\" alt=\"\" class=\"wp-image-684\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-3.png 554w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-3-245x300.png 245w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/figure>\n\n\n\n<p>OK now that we&#8217;re past the summary.. if you see a login prompt above on port 8080, you may also see the ability to login as an evaluator with either &#8220;Admin&#8221; or &#8220;Suzy&#8221;. I love how this software gives us the default logins for us, man how nice of them. Give those a shot and hopefully at least one or both accounts will get you in. If not, you can keep guessing logins as there doesn&#8217;t appear to be a rate limit. Keep in mind that the login prompt doesn&#8217;t seem to really change when you do an incorrect password but will &#8220;suddenly&#8221; let you in once you get the right one. The caps do matter for both username and password. In our case only Suzy let us in.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-4-1024x337.png\" alt=\"\" class=\"wp-image-685\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-4-1024x337.png 1024w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-4-300x99.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-4-768x253.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-4-600x198.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-4.png 1230w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Next step you&#8217;ll see the ability to &#8220;browse files&#8221; or &#8220;create files&#8221;. In our case only the browse files capability was working so we clicked there.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"631\" height=\"108\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-14.png\" alt=\"\" class=\"wp-image-700\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-14.png 631w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-14-300x51.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-14-600x103.png 600w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"215\" height=\"362\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-5.png\" alt=\"\" class=\"wp-image-686\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-5.png 215w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-5-178x300.png 178w\" sizes=\"auto, (max-width: 215px) 100vw, 215px\" \/><\/figure>\n\n\n\n<p>At this point, we see a bunch of options including one to download files. This wasn&#8217;t working inherently so we actually had to copy and paste files into our folder (suzy, which is now lowercase for some reason?). Once the files were in there we were able to download and view them as .ktr.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"722\" height=\"272\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-6.png\" alt=\"\" class=\"wp-image-687\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-6.png 722w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-6-300x113.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-6-600x226.png 600w\" sizes=\"auto, (max-width: 722px) 100vw, 722px\" \/><\/figure>\n\n\n\n<p>Pretty much all of the files had a &#8220;.ktr&#8221; suffix and the first thing I noticed was some hashes. These are actually other Pentaho servers and if you can crack them you get access to other Pentaho instances, nice. <\/p>\n\n\n\n<p>If you scroll down on some of the .ktr files you&#8217;ll find a &#8220;connection&#8221; section that allows for defining connections to external databases, this is really where we get lateral movement from these Pentaho servers. You&#8217;ll see something like the excerpt below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"610\" height=\"163\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-13.png\" alt=\"\" class=\"wp-image-695\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-13.png 610w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-13-300x80.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-13-600x160.png 600w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/figure>\n\n\n\n<p>Let&#8217;s go about decrypting these passwords.. by digging into the code to see if it&#8217;s possible:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"847\" height=\"489\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-7.png\" alt=\"\" class=\"wp-image-688\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-7.png 847w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-7-300x173.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-7-768x443.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-7-600x346.png 600w\" sizes=\"auto, (max-width: 847px) 100vw, 847px\" \/><\/figure>\n\n\n\n<p>We analyzed the <a href=\"https:\/\/github.com\/pentaho\/pentaho-kettle\">java code here<\/a> and it turns out these are not actually encrypted, they&#8217;re just obfuscated utilizing XOR with some default seed values. Googling around we can find a guide to decrypt these passwords using a different program made by the same company called Pentaho Data Integration.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Guide to Decode Encrypted Pentaho Business Analytics Hashes:<\/h3>\n\n\n\n<p>Key Note: You are now going to decrypt these hashes in a different tool called &#8220;Pentaho Data Integration&#8221; which we will download and install.<\/p>\n\n\n\n<p>We decided to install this on Ubuntu, first by grabbing .ktr file from <a href=\"https:\/\/github.com\/RHeijmann\/Pentaho-Kettle-Password-Decrypt\">this repo<\/a>, then following the guide to install it <a href=\"https:\/\/www.ubuntupit.com\/how-to-install-pentaho-data-integration-pdi-tool-on-ubuntu\/\">here<\/a>, which we will summarize the shortened version below:<\/p>\n\n\n\n<p>1. check java and make sure its 1.8.x<\/p>\n\n\n\n<p class=\"code\">java-version<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"70\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-8.png\" alt=\"\" class=\"wp-image-689\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-8.png 612w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-8-300x34.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-8-600x69.png 600w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><\/figure>\n\n\n\n<p>2. If not, run this command to install it<\/p>\n\n\n\n<p class=\"code\">sudo apt install openjdk-8-jdk<\/p>\n\n\n\n<p>3. Next install java runtime environment as well<\/p>\n\n\n\n<p class=\"code\">sudo apt install default-jre<\/p>\n\n\n\n<p>4. Download the tool from sourceforge <a href=\"https:\/\/sourceforge.net\/projects\/pentaho\/files\/latest\/download\">here<\/a>. Tip: you can wget the direct link.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"679\" height=\"586\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-9.png\" alt=\"\" class=\"wp-image-690\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-9.png 679w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-9-300x259.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-9-600x518.png 600w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/figure>\n\n\n\n<p>5. Unzip and you should see spoon.sh above, it&#8217;s already executable so just open a terminal in the folder and run:<\/p>\n\n\n\n<p class=\"code\">.\/spoon.sh<\/p>\n\n\n\n<p>6. You should see some sort of window that looks like this popup:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"959\" height=\"294\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-10.png\" alt=\"\" class=\"wp-image-691\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-10.png 959w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-10-300x92.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-10-768x235.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-10-600x184.png 600w\" sizes=\"auto, (max-width: 959px) 100vw, 959px\" \/><\/figure>\n\n\n\n<p>7. Right click &#8220;Transformations&#8221; and add a new transformation:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"929\" height=\"284\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-11.png\" alt=\"\" class=\"wp-image-692\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-11.png 929w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-11-300x92.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-11-768x235.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-11-600x183.png 600w\" sizes=\"auto, (max-width: 929px) 100vw, 929px\" \/><\/figure>\n\n\n\n<p>8. Drag in the .ktr file you downloaded earlier from <a href=\"https:\/\/github.com\/RHeijmann\/Pentaho-Kettle-Password-Decrypt\">here<\/a>. You should see an &#8220;Invoer&#8221; option, double click that and press on the &#8220;Data&#8221; tab, and put in your hash under the second column. Then press OK then the play button, then &#8220;run&#8221;, and then &#8220;yes&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"385\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/SNAG-0252.png\" alt=\"\" class=\"wp-image-693\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/SNAG-0252.png 889w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/SNAG-0252-300x130.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/SNAG-0252-768x333.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/SNAG-0252-600x260.png 600w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/><\/figure>\n\n\n\n<p>9. Now&#8230; you should see some checkmarks. Click on &#8220;Uitvoer&#8221; to highlight it. Now press on the &#8220;Preview Data&#8221; tab, and you should see your decrypted password under the third column!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"798\" height=\"594\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-12.png\" alt=\"\" class=\"wp-image-694\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-12.png 798w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-12-300x223.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-12-768x572.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-12-600x447.png 600w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><\/figure>\n\n\n\n<p>There you go!! <strong>Hash has been decrypted as &#8220;password&#8221;.<\/strong> Repeat for all the hashes you find!<\/p>\n\n\n\n<p>That&#8217;s pretty much as far as we go with this Pen Test Guide to Pentaho Business Analytics. Hopefully it saves you some time from trying to analyze and recompile java scripts, failing, then just installing the software like we did :). We also did the standard searchsploit\/metasploit\/exploitdb search on Pentaho and only found old exploits on ancient versions of the software so this was really the only path in we found. Let us know if you have other related findings for this software! <\/p>\n\n\n\n<p>If you found this interesting or really want to get started in pen testing, the OSCP was an excellent exam that taught me pretty much everything I know and was a great way to jump into the industry. We have a write-up for the exam <a href=\"https:\/\/zineausa.com\/blog\/2019\/01\/offensive-security-certified-professional-oscp-certification\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This guide was written following a very confusing and multi-day ordeal to enumerate what was found in an instance of this software during a pen test. Hopefully this Pen Test Guide to Pentaho Business Analytics will help you if you run into it on your tests. The summary of what this software does, is allows [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pen Test Guide to Pentaho Business Analytics - Zinea InfoSec Blog<\/title>\n<meta name=\"description\" content=\"A Pen Test Guide to logging in, finding encrypted passwords, and decrypting them in Pentaho Business Analytics and Data Analytics\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pen Test Guide to Pentaho Business Analytics - Zinea InfoSec Blog\" \/>\n<meta property=\"og:description\" content=\"A Pen Test Guide to logging in, finding encrypted passwords, and decrypting them in Pentaho Business Analytics and Data Analytics\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"Zinea InfoSec Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/zineausa\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-28T19:16:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-28T19:27:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Zinea\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ZineaLLC\" \/>\n<meta name=\"twitter:site\" content=\"@ZineaLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zinea\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/\"},\"author\":{\"name\":\"Zinea\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3c58d4f0650f7fb571c01fcf836b1d0\"},\"headline\":\"Pen Test Guide to Pentaho Business Analytics\",\"datePublished\":\"2020-07-28T19:16:35+00:00\",\"dateModified\":\"2020-07-28T19:27:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/\"},\"wordCount\":850,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/image-2.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/\",\"name\":\"Pen Test Guide to Pentaho Business Analytics - Zinea InfoSec Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/image-2.png\",\"datePublished\":\"2020-07-28T19:16:35+00:00\",\"dateModified\":\"2020-07-28T19:27:13+00:00\",\"description\":\"A Pen Test Guide to logging in, finding encrypted passwords, and decrypting them in Pentaho Business Analytics and Data Analytics\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/image-2.png\",\"contentUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/image-2.png\",\"width\":920,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2020\\\/07\\\/pen-test-guide-to-pentaho-business-analytics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pen Test Guide to Pentaho Business Analytics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\",\"name\":\"Zinea InfoSec Blog\",\"description\":\"Cyber Security Resources\",\"publisher\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\",\"name\":\"Zinea LLC\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/zinea-square.png\",\"contentUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/zinea-square.png\",\"width\":876,\"height\":876,\"caption\":\"Zinea LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/zineausa\\\/\",\"https:\\\/\\\/x.com\\\/ZineaLLC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3c58d4f0650f7fb571c01fcf836b1d0\",\"name\":\"Zinea\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"caption\":\"Zinea\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pen Test Guide to Pentaho Business Analytics - Zinea InfoSec Blog","description":"A Pen Test Guide to logging in, finding encrypted passwords, and decrypting them in Pentaho Business Analytics and Data Analytics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/","og_locale":"en_US","og_type":"article","og_title":"Pen Test Guide to Pentaho Business Analytics - Zinea InfoSec Blog","og_description":"A Pen Test Guide to logging in, finding encrypted passwords, and decrypting them in Pentaho Business Analytics and Data Analytics","og_url":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/","og_site_name":"Zinea InfoSec Blog","article_publisher":"https:\/\/www.facebook.com\/zineausa\/","article_published_time":"2020-07-28T19:16:35+00:00","article_modified_time":"2020-07-28T19:27:13+00:00","og_image":[{"width":920,"height":450,"url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-2.png","type":"image\/png"}],"author":"Zinea","twitter_card":"summary_large_image","twitter_creator":"@ZineaLLC","twitter_site":"@ZineaLLC","twitter_misc":{"Written by":"Zinea","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/#article","isPartOf":{"@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/"},"author":{"name":"Zinea","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/person\/e3c58d4f0650f7fb571c01fcf836b1d0"},"headline":"Pen Test Guide to Pentaho Business Analytics","datePublished":"2020-07-28T19:16:35+00:00","dateModified":"2020-07-28T19:27:13+00:00","mainEntityOfPage":{"@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/"},"wordCount":850,"commentCount":1,"publisher":{"@id":"https:\/\/zineausa.com\/blog\/#organization"},"image":{"@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-2.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/","url":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/","name":"Pen Test Guide to Pentaho Business Analytics - Zinea InfoSec Blog","isPartOf":{"@id":"https:\/\/zineausa.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/#primaryimage"},"image":{"@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-2.png","datePublished":"2020-07-28T19:16:35+00:00","dateModified":"2020-07-28T19:27:13+00:00","description":"A Pen Test Guide to logging in, finding encrypted passwords, and decrypting them in Pentaho Business Analytics and Data Analytics","breadcrumb":{"@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/#primaryimage","url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-2.png","contentUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2020\/07\/image-2.png","width":920,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/zineausa.com\/blog\/2020\/07\/pen-test-guide-to-pentaho-business-analytics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zineausa.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Pen Test Guide to Pentaho Business Analytics"}]},{"@type":"WebSite","@id":"https:\/\/zineausa.com\/blog\/#website","url":"https:\/\/zineausa.com\/blog\/","name":"Zinea InfoSec Blog","description":"Cyber Security Resources","publisher":{"@id":"https:\/\/zineausa.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zineausa.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zineausa.com\/blog\/#organization","name":"Zinea LLC","url":"https:\/\/zineausa.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/05\/zinea-square.png","contentUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/05\/zinea-square.png","width":876,"height":876,"caption":"Zinea LLC"},"image":{"@id":"https:\/\/zineausa.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/zineausa\/","https:\/\/x.com\/ZineaLLC"]},{"@type":"Person","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/person\/e3c58d4f0650f7fb571c01fcf836b1d0","name":"Zinea","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","caption":"Zinea"}}]}},"_links":{"self":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/comments?post=680"}],"version-history":[{"count":6,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/680\/revisions"}],"predecessor-version":[{"id":703,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/680\/revisions\/703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/media\/682"}],"wp:attachment":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/media?parent=680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/categories?post=680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/tags?post=680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}