ftp <Ziel-IP>
Name: anonymous
Password: <leeres Passwort>
ftp> ls
200 PORT command successful. Consider using PASV.
150 Here comes the directory listing.
-rw-rw-r-- 1 ftp ftp 8138592 Sep 16 17:24 Calendar.pptx
drwxrwxr-x 4 ftp ftp 4096 Sep 16 17:57 Clients
wget -m --no-passive ftp://anonymous:anonymous@<Ziel-IP>
--2024-09-19 14:45:58-- ftp://anonymous:*password*@<Ziel-IP>
Connecting to <Ziel-IP>:21... connected.
Logging in as anonymous ... Logged in!
==> SYST ... done. ==> PWD ... done.
==> TYPE I ... done. ==> CWD not needed.
==> LIST ... done.
Calendar.pptx [ <=> ] 8138592 --.-KB/s
ftp> put testupload.txt
local: testupload.txt remote: testupload.txt
200 PORT command successful. Consider using PASV.
150 Ok to send data.
226 Transfer complete.
ftp> ls
200 PORT command successful. Consider using PASV.
150 Here comes the directory listing.
-rw-rw-r-- 1 ftp ftp 0 Sep 19 15:10 testupload.txt
sudo nmap --script ftp-vsftpd-backdoor -p 21 <Ziel-IP>
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.3.4
| ftp-vsftpd-backdoor:
| VULNERABLE: vsFTPd version 2.3.4 backdoor command execution
openssl s_client -connect <Ziel-IP>:21 -starttls ftp
CONNECTED(00000003)
depth=0 C = US, ST = California, L = Sacramento, O = Inlanefreight
verify return:1
---
Certificate chain
0 s:/C=US/ST=California/O=Inlanefreight/CN=master.inlanefreight.htb
---