FTP
Název | Obrázek | Popis |
FTP | je v informatice protokol pro přenos souborů mezi počítači pomocí počítačové sítě. Využívá protokol TCP z rodiny TCP/IP a může být používán nezávisle na použitém operačním systému (je platformně nezávislý). | |
| ||
FTP Bounce Attack | Generally a file transfer happens when the source FTP server sends the data to the client which transmits the data to the destination FTP server. When there’s a slow network connection, people often resort to using a proxy FTP which makes the client instructs the data transmission directly between two FTP servers. A hacker can take advantage of this type of file transfer and use a PORT command to request access to ports by posing as a middle man for the file transfer request; then execute port scans on hosts discreetly and gain access data transmitted over the network. | |
FTP Brute Force Attack | An attacker can carry out a brute force attack to guess the FTP server password by implementing a means to repeatedly try different password combinations until they can succeed in the break-in. A weak password and repeated use of the same password for multiple FTP servers can also help the hacker gain quick access. Once the password is guessed, your data is exposed. | |
Packet Capture (or Sniffing) | Because the data transfer via FTP is in clear text, any sensitive information such as usernames, passwords can be easily read network packet capture techniques such as packet sniffing. A packet sniffer is just a piece of computer program which can capture transmitted data packets and decode the packet's raw data exposing data contained in the various fields of the packet | |
Spoof Attack | When we restrict access to FTP servers based on the network address, it is possible that a cyber-criminal can use an external computer and assume the host address of a computer on the enterprise network, and download files during data transfer. | |
Port Stealing |
When operating systems assign dynamic port numbers in a particular order
or pattern, an attacker easily decodes the pattern and identify the next
port number which will be used. By illegally gaining access to a port
number, the legitimate client trying to access the file will be denied
and the hacker can steal files, or even insert a forged file or
malicious file into the data stream which will be accessed by other
legitimate users in the organization. | |
Managed File Transfer Remedies the Vulnerabilities in FTP | Managed file transfer (MFT) is the best option for file transfer compared to all other file sharing methods such as using FTP, HTTP, TFTP, peer-to-peer file sharing and cloud drives. A managed file transfer server facilitates secure file transfer through the Internet by providing a high level of data security. The MFT server software provides secure internal, external and ad-hoc file transfers for both pull-based and push-based file transfers. Though MFT also uses FTP for data transfer, this type of file transfer ensures the data is protected by using secure FTP (FTPS, SFTP, etc.) With B2B file transfers, especially in a DMZ environment when internal IP addresses need to be concealed, MFT server’s authentication and data encryption methods help ensure secure, reliable and auditable file transfer. | |
|
|
|