🔬FTP

Lab 1

🔬 ProFTP Recon: Basics

  • Target IP: 192.209.45.3

  • Brute-force of ProFTP server

  • Enumeration, nmap brute-force and flags have been already covered in this FTP Enum lab

nmap -sV 192.209.45.3
21/tcp open  ftp  ProFTPD 1.3.5a
  • Check anonymous login and inherent vulnerabilities

ftp 192.209.45.3
# anonymous login failed
ls -al /usr/share/nmap/scripts | grep ftp-*

Brute-Force

  • Try to connect with FTP and found credentials and retrieve every user's flag:


Last updated

Was this helpful?