πŸ“FTP Attacks

🎯 Overview

This document covers exploitation techniques against FTP services, focusing on practical attack methodologies from HTB Academy's "Attacking Common Services" module. Unlike enumeration, these techniques aim to gain unauthorized access, escalate privileges, or exploit misconfigurations.

"The File Transfer Protocol (FTP) is a standard network protocol used to transfer files between computers. We can abuse misconfigurations or excessive privileges, exploit known vulnerabilities or discover new vulnerabilities."

πŸ—οΈ FTP Attack Methodology

Attack Chain Overview

Service Discovery β†’ Misconfiguration Analysis β†’ Authentication Attacks β†’ File System Exploitation β†’ Privilege Escalation

Key Attack Objectives

  • Unauthorized file access through anonymous authentication

  • Credential compromise via brute force attacks

  • Network pivoting using FTP bounce attacks

  • Remote code execution through file upload capabilities

  • Information disclosure via configuration analysis


⚠️ Misconfiguration Exploitation

Anonymous Access Abuse

Anonymous Authentication Attack

Mass Data Extraction


πŸ” Authentication Attacks

Brute Force with Medusa

Basic Medusa Usage

Advanced Medusa Attacks


🌐 FTP Bounce Attack Exploitation

HTB Academy FTP Bounce Implementation

Manual FTP Bounce Attack


πŸ—ƒοΈ File System Exploitation

Web Shell Upload Attack

Directory Traversal Attacks


πŸ“‹ FTP Attack Checklist

Authentication Attacks

Exploitation Attacks

Post-Exploitation


🎯 HTB Academy Lab Scenarios

Scenario 1: Anonymous Access Exploitation

Scenario 2: Brute Force with Medusa

Scenario 3: FTP Bounce Attack


πŸ’‘ Key Attack Insights

Attack Effectiveness Factors

  1. Anonymous access - Immediate exploitation opportunity

  2. Write permissions - Enable file upload attacks

  3. Web directory access - Direct path to code execution

  4. Weak credentials - Entry point for authorized access

  5. Internal network position - Pivot for lateral movement

Common Attack Patterns

  1. Reconnaissance β†’ Anonymous testing β†’ File extraction

  2. Brute force β†’ Credential discovery β†’ Privilege abuse

  3. Bounce attack β†’ Internal scanning β†’ Lateral movement

  4. File upload β†’ Web shell β†’ Remote code execution

  5. Configuration abuse β†’ Persistence β†’ Privilege escalation


This document provides comprehensive FTP attack methodologies based on HTB Academy's "Attacking Common Services" module, focusing on practical exploitation techniques for penetration testing and security assessment.

Last updated