Reference no: EM133015760
MN623 Ethical Hacking and Analytics
Penetration Testing on FTP Server with Brute-Force Attacks
Learning Outcome:
- Analyse cyber security threats and attacks
- Implement and evaluate security testing tools in a realistic computing environment
Practical Tasks:
During the next two sessions, you will learn how to perform penetration testing on the FTP server (using port 21) with the Brute-Force Password Guessing Attacks.
For the testing environment, we will use the FTP server installed on either Linux or Windows machine (follow the lecturers instructions). You can extend your skills to perform penetration testing on a mainframe server for a major enterprise.
Open the penetration testing lab environment
1. Open the lab environment with Kali-Linux and FTP Victim Machine.
Create Wordlist attack file with CRUNCH Command
2. Use CRUNCH command to create a Wordlist attack file with the length of 3 using letters ABCD only - display the output in your report.
3. Use CRUNCH command to create a Wordlist attack file with length between 3 and 4 using letters ABCDE only - generate the output as a Text file to the folder of your choice (e.g. /root/Desktop/ on Kali Linux).
4. Report the command to create a Wordlist attack file with length of 8 with all English alphanumeric characters using CRUNCH command (do not run this command as it will take a very long time to process).
Configure FTP Username and Password on Windows XP
5. On the FTP server, create a FTP user account with username ‘admin' with a simple password ‘1234'.
6. On the FTP server, create another FTP user account with username ‘user' with a stronger password ‘user123'.
Attack FPT Server
7. Use either JOHNNY or HYDRA attack commands to perform penetration testing on the FTP server
8. Show the evidence of successful FTP connection
Review the Attack Scenario
9. Discuss the difference(s) between JOHNNY attack and HYDRA attack
10. Discuss how you can secure the FTP servers.
Attachment:- Ethical Hacking and Analytics.rar