FreeSWITCH


Nmap discovered a FreeSWITCH service on the target port 8021 The running service is FreeSWITCH mod_event_socket

FreeSWITCH is a free and open-source telephony software for real-time communication protocols using audio, video, text and other forms of media. The software has applications in WebRTC, voice over Internet Protocol (VoIP), video transcoding, Multipoint Control Unit (MCU) functionality and supports Session Initiation Protocol (SIP) features.

According to the official documentation, mod_event_socket is a module within FreeSWITCH that is a TCP-based interface to control FreeSWITCH, and it operates in two modes, inbound and outbound. (These terms are relative to FreeSWITCH). By default, connections are only allowed from localhost, but this can be changed via configuration files

Connecting


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/clue]
└─$ telnet $IP 8021                                                     
Trying 192.168.220.240...
Connected to 192.168.220.240.
Escape character is '^]'.
Content-Type: auth/request

Connecting to the port reveals some interesting data That’s an authentication request, which can be replied with the auth command

Trying the default password, ClueCon, from the backup in the Samba server appears to fail

Vulnerabilities


Looking it up online for known vulnerabilities reveals a RCE vulnerability