🥷
Penetration Testing Notes
Home
  • Notes
  • Port Scanning
  • Credential-less Enumeration
    • Secure Shell
    • Simple Mail Transfer Protocol
    • File Transfer Protocol
    • Domain Name Service
    • Hypertext Transfer Protocol
    • Internet Message Access Protocol / Post Office Protocol
    • Kerberos
    • Remote Procedure Call
    • Server Message Block
    • Simple Network Management Protocol
    • Lightweight Directory Access Protocol
    • Netlogon Remote Protocol
    • Network File Share
    • Remote Desktop Protocol
    • My Structured Query Language
    • Microsoft Structured Query Language
    • Oracle Transparent Network Substrate
    • Intelligent Platform Management Interface
    • Rsync
    • R-Services
    • Remote Desktop Protocol
    • Windows Remote Management
    • Windows Management Instrumentation
  • Credentialed Enumeration
    • Secure Shell
    • Server Message Block
    • Lightweight Directory Access Protocol
    • Kerberos
    • MSSQL
    • Windows Remote Management
  • Privilege Escalation
    • Linux
    • Windows
  • Windows Active Directory
    • Abuse Weak Access Control Lists (ACLs)
    • Overpass The Hash
    • Object Scoping
    • Pass The Ticket
  • Miscellaneous
    • File Transfers
    • Shells & Payloads
    • Metasploit Framework
    • Password Mutations
  • All Notes
Powered by GitBook
On this page
  • Anonymous Access
  • File Download
  • File upload remote code execution
  • Meta Data
  1. Credential-less Enumeration

File Transfer Protocol

Anonymous Access

Check for anonymous login guest, ftp, anonymous, anonymous@anonymous.com

ftp $ip

File Download

Type "passive" if needed to remove passive mode to be able to continue to access ftp. type "binary" first then get to download files

ftp> passive
ftp> binary

Recursively download files via ftp

wget -r ftp://user:pass@ip/

If you find password-protected zip files use zip2john followed by john the hash

zip2john file.zip >> hashes.txt
john hashes.txt

File upload remote code execution

If ftp allows uploading of files and the webserver has an local file inclusion vulnerability you can upload a php shell and call the file from the webserver to gain a reverse shell maybe it’ll have functionality that auto-executes uploaded files periodically.

ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution

Meta Data

Extract meta data and may contain email addresses

exiftool file
PreviousSimple Mail Transfer ProtocolNextDomain Name Service

Last updated 1 year ago