FTP


Nmap discovered a FTP server on the target port 21 The running service is ProFTPD 1.3.5b

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/roquefort]
└─$ ftp ftp@$IP
Connected to 192.168.206.67.
220 ProFTPD 1.3.5b Server (Debian) [::ffff:192.168.206.67]
331 Password required for ftp
Password: 
530 Login incorrect.
ftp: Login failed
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/roquefort]
└─$ ftp anonymous@$IP      
Connected to 192.168.206.67.
220 ProFTPD 1.3.5b Server (Debian) [::ffff:192.168.206.67]
331 Password required for anonymous
Password: 
530 Login incorrect.
ftp: Login failed

The target FTP server does not allow anonymous access

Vulnerabilities


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/roquefort]
└─$ searchsploit ProFTPD 1.3.5
----------------------------------------------------------- ---------------------------------
 Exploit Title                                             |  Path
----------------------------------------------------------- ---------------------------------
ProFTPd 1.3.5 - 'mod_copy' Command Execution (Metasploit)  | linux/remote/37262.rb
ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution        | linux/remote/36803.py
ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2)    | linux/remote/49908.py
ProFTPd 1.3.5 - File Copy                                  | linux/remote/36742.txt
----------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results

The target FTP server appear to suffer from the known mod_copy vulnerability; CVE-2015-3306 However, it would require authentication and no credential is known at this time