Pure Ftpd Metasploit

Ftp vulnerabilities, SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and most comprehensive database of computer security knowledge and resources to the public. Metasploit (Pure-FTPd External Authentication Bash Environment Variable Code Injection)Reference Information. CVE: CVE-2014-7169. How To Exploit The PURE-FTPd FTP Server Using Metasploit.? By: January 1, 2016. I have scanned a website and found that the FTP port(21) is open it's version is 'PURE FTPd', so I want to know that how can I exploit the FTP port so that I can hack the server.Please help me it's urgent. (One thing I want to mention is that, I am trying to hack.

I’ve tried different solution for automatic backup of Cisco devices from different clients including python ssh scripting and so on. Cisco included in his routers and switches the “archive” and the “kron” commands that help us in our task and makes it very easy. In this tutorial we describe how to install a better solution than tftp server with FTP protocol, using pure-ftp and centos 7.

01 050fbcb0 69ff3bf0 0000000a 000002ce 00000001 0b 050fbfec 5f561d7a 050fc010 6ad0efe0 0000001b 01 050fbcb0 69ff3bf0 0000000a 000002ce. TP-Link TL-WR1043ND comes with 1 Gigabit WAN and 4 Gigabit LAN as well as 1 USB port. The USB port is for storage purpose. It is a 300Mbps N Wireless router. This router can flash to DD-WRT to enhance its features.

tasks:

– scheduled backup of running-config file on remote FTP server
– automatic snapshot at every write memory command

steps:

– pure-ftp installation
– Cisco device configuration

Pure-ftp

in this configuration we’re gonna use virtual user access (no PAM or Unix access)

download epel package

install pure-ftp

configure and set some security settings pure-ftpd

here are some settings:

on centos system we create a pure-ftp user with the relative group:

let’s create a folder to be used for the FTP-server

change folder permissions

create a virtual user “bob” with home folder /home/user/ftp-folder/

insert password.

create virtual user database with this command:

list users with folders

Proftpd Vs Pure Ftpd

our ftp server is ready

Cisco Devices settings

in this case we want to configure an automatic configuration backup every time we save changes to our device with the command “copy run start” and every day at 01:00 am

insert login parameters to access ftp server

enable backup every time we save the configuration:

in this case when we execute “wr” or “copy running-config startup-config” there’ll be a configuration transfer to our FTP server

if we want to schedule an automatic backup we have to set up the kron command

with the command:

we can check if everything is ok.
using sh kron schedule

we have information about the next time the schedule will be executed.

at this point we have a working system for automatic backup of cisco devices.
The problem at this point will be the logrotate for the rotation of older files that we don’t need to store. This will be the argument of the next tutorial

enjoy

In this post on how to hack anonymous ftp server, we are going to see an old but still gold way of accessing private resources on ftp servers without requiring any authentication.

Anonymous access is a well known vulnerability in ftp servers. It allows anybody to log in to the ftp server by using anonymous as the username and password both. Once the user successfully logs in to the ftp server, he can access all the resources including backup files, password file and other files containing sensitive data.

To exploit this vulnerabiltiy, we first need to the ftp servers which are vulnerable to anonymous access vulnerability. Shodan is the best place to find such stuff. If you are not aware, shodan is a search engine which uses banner grabbing to find publically available websites and services which are vulnerable to certain type of security vulnerabilites.

Pure

Pure Ftpd Add User

To use shodan, visit www.shodan.io and use the search bar to find vulnerable softwares. The search bar is pretty much similar to google and you can use it the same way. For our purpose, enter the query string ftp anonymous ok in search bar and press enter.

When you press the enter, the search will return a lot of results as shown. We can use any one of them.

Now that we know the ip address of vulnerable ftp server, we can simply visit the ip from our browser using ftp protocol. For eg: we can visit ftp://128.127.144.4/ and it will show us all the files available on this particular ftp server.

As you can see, we are able to access the resources on this server without any authentication. This is because the server allows anonymous access. When we visit the IP address using our browser, the browser automaticaly submits the credentials for anonymous access. This is why we do not need to submit any username or password to access it

Vsftpd Vs Pure Ftpd

That’s it for this post. I hope you like it. Please share your feedback in comments section.

Pure Ftpd Configuration


Note: Use Virtual Machine and scan on VirusTotal before downloading any program on Host Machine for your privacy.