Squid
Nmap discovered a Squid service on the target port 3128
The running is service is Squid http proxy 4.14
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/squid]
└─$ curl -I -X OPTIONS http://$IP:3128/
HTTP/1.1 400 Bad Request
Server: squid/4.14
Mime-Version: 1.0
Date: Thu, 10 Apr 2025 10:10:47 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3394
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from SQUID
Via: 1.1 SQUID (squid/4.14)
Connection: close
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/squid]
└─$ curl -I http://$IP:3128/
HTTP/1.1 400 Bad Request
Server: squid/4.14
Mime-Version: 1.0
Date: Thu, 10 Apr 2025 10:10:52 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3394
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from SQUID
Via: 1.1 SQUID (squid/4.14)
Connection: close
Webroot
It’s a Squid HTTP Proxy server
Squid is a caching and forwarding HTTP web proxy. It has a wide variety of uses, including speeding up a web server by caching repeated requests, caching World Wide Web (WWW), Domain Name System (DNS), and other network lookups for a group of people sharing network resources, and aiding security by filtering traffic. Although used for mainly HTTP and File Transfer Protocol (FTP), Squid includes limited support for several other protocols including Internet Gopher, Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Hypertext Transfer Protocol Secure (HTTPS). Squid does not support the SOCKS protocol, unlike Privoxy, with which Squid can be used in order to provide SOCKS support.
Source code is available for review
Since this is a proxy, I can leverage this to access the internal services
Version Information
The version information is disclosed at the footer;
4.14
Vulnerabilities
Looking it up online reveals a vulnerability;
CVE-2021-28116
N/A