FTP Bounce attack - Scan
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Unganisha kwenye FTP iliyo hatarini
Tumia **PORT
** au EPRT
(lakini moja tu kati yao) ili kuanzisha muunganisho na <IP:Port> unayotaka kuchunguza:
PORT 172,32,80,80,0,8080
EPRT |2|172.32.80.80|8080|
3. Tumia LIST
(hii itatuma tu kwa <IP:Port> iliyounganishwa orodha ya faili za sasa katika folda ya FTP) na angalia majibu yanayowezekana: 150 File status okay
(Hii inamaanisha port iko wazi) au 425 No connection established
(Hii inamaanisha port imefungwa)
Badala ya LIST
unaweza pia kutumia RETR /file/in/ftp
na kutafuta majibu yanayofanana ya Open/Close
.
Mfano kwa kutumia PORT (port 8080 ya 172.32.80.80 iko wazi na port 7777 imefungwa):
Mfano sawa kwa kutumia EPRT
(uthibitisho umeachwa kwenye picha):
Port wazi kwa kutumia EPRT
badala ya LIST
(mazingira tofauti)
Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)