CYBER-BASICS:1 FTP

WHAT IS FTP?


FILE TRANSFER PROTOCOL is a standard protocol used for transfer of computer files from a server to a client on a computer network. It is built on a client server model using separate control connections and data connections between the both of them.

FTP IN COMMON TERMS 

FTP uses a basic command reply mechanism. The client will connect to the FTP servers on port 21, the port 21 is primarily reserved for ftp connections.
 
The client will begin a synchronous conversation by sending a command to which the server will reply.

If the server replies well it means that the server is ready for the next command.The reply will come in a standardized format.

The first 3 numerals on the reply determine the state of the server.
If the first digit of the reply is 1,2,3 the reply is good and server is ready or something else which will be indicated by the next 2 digits.
If the first digit is 4 or 5 the reply is not good

Lets look at some standard replies:-
331 :- send password
23:- logged in 
250 :- success 




For secure transmission it encrypts the content of the packets sent and recieved.
It is encrypted either with SSL/TLS or FTPS or SFTP .

WHAT CAN USERS DO USING FTP

FTP can be used to store, transmit and comb through data between the server and the client. FTP generally works on a Command Line Interface but it can be accessed through a GUI.
The best and most known GUI based FTP service is filezilla.

The CYBER VIEW on FTP

Any FTP traffic can be intercepted using a MAN IN THE MIDDLE ATTACK.
To save yourselves from this we can use protocols mentioned above for encryption of dat and security of transmission.

DEFENDING THE FTP CONNECTION

The most common technique that is done is :- 
Redirect FTP through SSH on port 22 (generally deafult for ssh) and make it use SFTP








EXPLOITS AND VULNERABILITIES ON FTP

 Since FTP allows you to use an anonymous account to access it if you access it by username anonymous it will disregard any password you enter through it and will let you access the server
This is most commonly seen when there is a misconfiguration while creating a server.


More can be found using the GHDB :-




Comments

Popular posts from this blog

CYBER-BASICS 3: SQL

CYBERTOOLS:4-Using Decoys and Packet Fragmentation in nmap to bypass firewalls

SNORT Installation