FTP transfers password in plaintext, which is vulnerable to eavesdropping#.
File Transfer Protocol (FTP)
- Well-Known Ports
-
Server-Side Request Forgery (SSRF)
SSRF is an exploit using the *shortcoming of URL Parsing#* from the targeted server to access internal service, which should not be accessible from the outside world, by passing arbitrary commands to that service embedded with the URL parameter. The attacker could use the server as a proxy to request services from the supposedly internal processes. They could smuggle protocols such as SMTP, File Transfer Protocol (FTP), HTTP and Redis within the URL.
-
SSH Tunnelling
#Secure Shell (SSH) could be used to tunnel insecure #Transmission Control Protocol (TCP) connections such as File Transfer Protocol (FTP) or IMAP if the configuration
AllowTcpForwarding
is enabled. This provides a secure layer onto the TCP connection without resort to displacing such protocol within a network. - Internet Protocol Suite (TCP/IP)
- Differentiated Service
-
Cipher Block Chaining (CBC)
Generally, it used for general-purpose block-oriented transmission and authentication such as email, File Transfer Protocol (FTP)#, web etc.
- Application Layer