2.7 KiB
2.7 KiB
Description
This module allows us to scan through a series of IP Addresses and provide details about the version of ftp running on that address.
Vulnerable Application
Install ftp server on Kali Linux:
apt-get install vsftpd
- Allow local users to log in and to allow ftp uploads by editing file
/etc/vsftpd.conf
uncommenting the following:
local_enable=YES
write_enable=YES
chroot_list_enable=YES
chroot_list_file=/etc/vsftpd.chroot_list
- Create the file
/etc/vsftpd.chroot_list
and add the local users you want allow to connect to FTP server. Start service and test connections: service vsftpd start
Installing FTP for IIS 7.5 in Windows:
IIS 7.5 for Windows Server 2008 R2:
- On the taskbar, click Start, point to Administrative Tools, and then click Server Manager.
- In the Server Manager hierarchy pane, expand Roles, and then click Web Server (IIS).
- In the Web Server (IIS) pane, scroll to the Role Services section, and then click Add Role Services.
- On the Select Role Services page of the Add Role Services Wizard, expand FTP Server.
- Select FTP Service. (Note: To support ASP.NET Membership or IIS Manager authentication for the FTP service, you will also need to select FTP Extensibility.)
- Click Next.
- On the Confirm Installation Selections page, click Install.
- On the Results page, click Close.
IIS 7.5 for Windows 7:
- On the taskbar, click Start, and then click Control Panel.
- In Control Panel, click Programs and Features, and then click Turn Windows Features on or off.
- Expand Internet Information Services, then FTP Server.
- Select FTP Service. (Note: To support ASP.NET Membership or IIS Manager authentication for the FTP service, you will also need to select FTP Extensibility.)
- Click OK.
Verification Steps
- Do:
use auxiliary/scanner/ftp/ftp_version
- Do:
set RHOSTS [IP]
- Do:
set RPORT [IP]
- Do:
run
Scenarios
vsFTPd 3.0.3 on Kali
msf > use auxiliary/scanner/ftp/ftp_version
msf auxiliary(ftp_version) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf auxiliary(ftp_version) > set RPORT 21
RPORT => 21
msf auxiliary(ftp_version) > exploit
[*] 127.0.0.1:21 - FTP Banner: '220 (vsFTPd 3.0.3)\x0d\x0a'
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(ftp_version) >
Confirming using NMAP
root@kali:~# nmap -sV 127.0.0.1 -p21
Starting Nmap 7.40SVN ( https://nmap.org ) at 2017-04-24 23:11 IST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000035s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
Service Info: OS: Unix
root@kali:~#