πFTP Attacks
π― Overview
ποΈ FTP Attack Methodology
Attack Chain Overview
Service Discovery β Misconfiguration Analysis β Authentication Attacks β File System Exploitation β Privilege EscalationKey Attack Objectives
β οΈ Misconfiguration Exploitation
Anonymous Access Abuse
Anonymous Authentication Attack
Mass Data Extraction
π Authentication Attacks
Brute Force with Medusa
Basic Medusa Usage
Advanced Medusa Attacks
π FTP Bounce Attack Exploitation
HTB Academy FTP Bounce Implementation
Manual FTP Bounce Attack
ποΈ File System Exploitation
Web Shell Upload Attack
Directory Traversal Attacks
π FTP Attack Checklist
Authentication Attacks
Exploitation Attacks
Post-Exploitation
π― HTB Academy Lab Scenarios
Scenario 1: Anonymous Access Exploitation
Scenario 2: Brute Force with Medusa
Scenario 3: FTP Bounce Attack
π‘ Key Attack Insights
Attack Effectiveness Factors
Common Attack Patterns
Last updated