21 TCP | FTP PORT ABUSE
Hello dear readers, first of all, I’d like to give you some information about 21 TCP | FTP Protocol today.
21st Port is a protocol that does the file transfers and all the other input and outputs on the web hosting system.
But people with ill intentions may try to find the vulnerabilities of these ports and abuse them.
Now, I’ll show you how the port abuse happens with examples
NOTE: THIS PENTEST IS COMPLETELY FOR EDUCATION. WE DO NOT ACCEPT THE RESPONSIBILITY OF WHAT YOU DO WITH THE INFORMATION YOU GET HERE. WOULD YOU ATTEMPT TO DO THIS IN REAL LIFE, YOU WILL BE FACING AGAINST THE LAW.
First of all, to be able to scan all of the devices connected to our network we need to know our gateway. To do this, you should enter the route-n command.
As you can see, the gateway is 192.168.29.2
Now we have to enter the zenmap command and run zenmap.
Zenmap tool is running now, as you can see. Now we should enter the gateway number like 192.168.29.2/24 and press the scan button.
Your gateway number may be different. Please enter your own gateway number.
Now we found a vulnerability in the system. Now you have to search on Google to see which exploit you can use.
You can see the search results when you enter the version information of it. This means the vulnerability has already been exploited and exposed. Next step is to go to the terminal and enter the msfconsole command.
After this step, enter the following commands in the sequence you see below
- use exploit/unix/ftp/vsftpd_234_backdoor
- show options
- set RHOST “target system”
As you can see, the abuse is successful.