πFTP Attacks
π― Overview
This document covers exploitation techniques against FTP services, focusing on practical attack methodologies from HTB Academy's "Attacking Common Services" module. Unlike enumeration, these techniques aim to gain unauthorized access, escalate privileges, or exploit misconfigurations.
"The File Transfer Protocol (FTP) is a standard network protocol used to transfer files between computers. We can abuse misconfigurations or excessive privileges, exploit known vulnerabilities or discover new vulnerabilities."
ποΈ FTP Attack Methodology
Attack Chain Overview
Service Discovery β Misconfiguration Analysis β Authentication Attacks β File System Exploitation β Privilege EscalationKey Attack Objectives
Unauthorized file access through anonymous authentication
Credential compromise via brute force attacks
Network pivoting using FTP bounce attacks
Remote code execution through file upload capabilities
Information disclosure via configuration analysis
β οΈ Misconfiguration Exploitation
Anonymous Access Abuse
Anonymous Authentication Attack
Mass Data Extraction
π Authentication Attacks
Brute Force with Medusa
Basic Medusa Usage
Advanced Medusa Attacks
π FTP Bounce Attack Exploitation
HTB Academy FTP Bounce Implementation
Manual FTP Bounce Attack
ποΈ File System Exploitation
Web Shell Upload Attack
Directory Traversal Attacks
π FTP Attack Checklist
Authentication Attacks
Exploitation Attacks
Post-Exploitation
π― HTB Academy Lab Scenarios
Scenario 1: Anonymous Access Exploitation
Scenario 2: Brute Force with Medusa
Scenario 3: FTP Bounce Attack
π‘ Key Attack Insights
Attack Effectiveness Factors
Anonymous access - Immediate exploitation opportunity
Write permissions - Enable file upload attacks
Web directory access - Direct path to code execution
Weak credentials - Entry point for authorized access
Internal network position - Pivot for lateral movement
Common Attack Patterns
Reconnaissance β Anonymous testing β File extraction
Brute force β Credential discovery β Privilege abuse
Bounce attack β Internal scanning β Lateral movement
File upload β Web shell β Remote code execution
Configuration abuse β Persistence β Privilege escalation
This document provides comprehensive FTP attack methodologies based on HTB Academy's "Attacking Common Services" module, focusing on practical exploitation techniques for penetration testing and security assessment.
Last updated