Exploiting FTP

  • Method Breakdown

    • Once you know there is an FTP server running on the victim machine and a possible username

    • Use this information to try and bruteforce the password of the FTP server using Hydra

References

Last updated