Web
Nmap discovered a Web server on the target port 8000
The running service is BarracudaServer.com (Windows)
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/medjed]
└─$ curl -I -X OPTIONS http://$IP:8000/
HTTP/1.1 200 OK
Date: Fri, 11 Apr 2025 16:42:32 GMT
Server: BarracudaServer.com (Windows)
Connection: Keep-Alive
Allow: OPTIONS, GET, HEAD, PROPFIND, PUT, COPY, DELETE, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK
DAV: 1, 2
MS-Author-Via: DAV
Content-Length: 0
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/medjed]
└─$ curl -I http://$IP:8000/
HTTP/1.1 200 OK
Date: Fri, 11 Apr 2025 16:42:36 GMT
Server: BarracudaServer.com (Windows)
Connection: Keep-Alive
Last-Modified: Tue, 19 Feb 2013 19:58:47 GMT
Content-Length: 8295
Webroot
Redirected to what appears to be an initialization page for BarracudaDrive Server;
/Config-Wizard/wizard/SetAdmin.lsp
It appears to be a mirror instance of web server on the target port 44330
Initialization
Invalid email address
It might be checking the structure
using the
example.com
domain
It would appear that the initialization process has been completed
Web File Server
BarracudaDrive features a web file server that is essentially a WebDAV server
Heading over to the filesystem(
/fs
), it shows 2 drives; C
and D
Mounting the current directory using a WebDAV session URL is possible through the highlighted button
and it pops open a window displaying the WebDAV session URL;
http://192.168.156.127:8000/fs/433632d267f96d88/
WebDAV
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/medjed]
└─$ cadaver
dav:!> open http://192.168.156.127:8000/fs/433632d267f96d88/
dav:/fs/433632d267f96d88/>
Using cadaver WebDAV client, i can connect to the WebDAV session URL above
dav:/fs/433632d267f96d88/> cd ..
Authentication required for Web File Server on server `192.168.156.127':
Username: admin
Password:
dav:/fs/> ls
Listing collection `/fs/': succeeded.
Coll: C 0 Jan 1 1970
Coll: D 0 Jan 1 1970
Authentication was required, so I did it
dav:/fs/> cd C
dav:/fs/C/> ls
Listing collection `/fs/C/': succeeded.
Coll: $Recycle.Bin 0 Nov 3 2020
Coll: $WinREAgent 0 Dec 2 2021
Coll: Documents and Settings 0 Oct 16 2020
Coll: FTP 0 Nov 3 2020
Coll: PerfLogs 0 Dec 7 2019
Coll: Program Files (x86) 0 Dec 2 2021
Coll: Program Files 0 Dec 2 2021
Coll: ProgramData 0 Dec 7 2021
Coll: RailsInstaller 0 Nov 3 2020
Coll: Recovery 0 Dec 2 2021
Coll: Ruby26-x64 0 Nov 3 2020
Coll: Sites 0 Nov 3 2020
Coll: System Volume Information 0 Oct 16 2020
Coll: Users 0 Dec 2 2021
Coll: Windows 0 Apr 8 2022
Coll: bd 0 Apr 11 21:20
Coll: xampp 0 Oct 17 2020
DumpStack.log.tmp 8192 Aug 2 2024
output.txt 2696 Apr 11 21:19
pagefile.sys 738197504 Aug 2 2024
swapfile.sys 268435456 Aug 2 2024
Now I have access to the target system’s C
drive
This would be the entry point since I can directly upload files to the target system.
Version Information
The version information is disclosed at the
/rtl/about.lsp
endpoint
Vulnerabilities
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/medjed]
└─$ searchsploit BarracudaDrive 6.5
-------------------------------------------------- ---------------------------------
Exploit Title | Path
-------------------------------------------------- ---------------------------------
BarracudaDrive v6.5 - Insecure Folder Permissions | windows/local/48789.txt
-------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results
The exploit is for local privilege escalation