Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

FTP bounce attack

From Wikipedia, the free encyclopedia

FTP bounce attack is anexploit of theFTP protocol whereby an attacker is able to use thePORT command to request access toports indirectly through the use of the victim machine, which serves as a proxy for the request, similar to anOpen mail relay usingSMTP.[1]

This technique can be used toport scan hosts discreetly, and to potentially bypass a network'saccess-control list to access specific ports that the attacker cannot access through a direct connection, for example with thenmapport scanner.[2]

Nearly all modern FTP server programs are configured by default to refusePORT commands that would connect to any host but the originating host, thwarting FTP bounce attacks.

See also

[edit]

References

[edit]
  1. ^M. Allman; S. Ostermann (1999)."RFC 2577".doi:10.17487/RFC2577.
  2. ^"ftp-bounce", Nmap Scripting Engine documentation

External links

[edit]
Stub icon

Thiscomputer networking article is astub. You can help Wikipedia byadding missing information.

Retrieved from "https://en.wikipedia.org/w/index.php?title=FTP_bounce_attack&oldid=1309973276"
Categories:
Hidden category:

[8]ページ先頭

©2009-2026 Movatter.jp