FTP
1) scan complete FTP Port
nmap --script=ftp-* -p 21 $ip 2) Brute-force default FTP credentials
hydra -C /usr/share/wordlists/seclists/Passwords/Default-Credentials/ftp-betterdefaultpasslist.txt IP ftp3) check if anonymous allowed then use ftp anonymous@ip (password also anonymous)
4) Active from passive
5) File Operations
mget * (# Download everything from current directory like zip, pdf, doc)
send/put (# Send single file or upload shell command)wget -m ftp://Ip/sharename6) After download files always use
exiftool –u -a <filename> (Meta description for users)TIP: ·FTP version above 3.0 not exploitable
Last updated