![]() ![]() Spoofing attack where the attacker may use a tool to try multiple instances of an IP address in order to assume the correct, and therefore spoofing, the host address of the target machine.Port stealing where traffic directed at a port is stolen or intercepted by an attacker. ![]() ![]() Packet capture through the use of packet capture tools.FTP bounce attacks which is an exploit enabling an attacker to use the PORT command to request access to ports indirectly through the use of the target machine as a man in the middle request.Brute force attacks which is attacking via computing credential combinations.Over time there has been other forms of file transfer protocols made available as there had been vulnerabilities and weaknesses with FTP such as: Shortform for File Transfer Protocol, the objectives of FTP are 1) to promote sharing of files (computer programs and/or data), 2) to encourage indirect or implicit (via programs) use of remote computers, 3) to shield a user from variations in file storage systems among hosts, and 4) to transfer data reliably and efficiently.įTP has had a long evolution over many years starting with its beginnings published as RFC 114 on 16 April 1971.
0 Comments
Leave a Reply. |