Book Image

Wireshark Network Security

By : Piyush Verma
Book Image

Wireshark Network Security

By: Piyush Verma

Overview of this book

Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Index

Miscellaneous attacks


In this section, we will look at some uncategorized but important attacks from a network's perspective.

FTP bounce attack

This is an old technique to perform port scanning in a stealthy way. The vulnerability lies in the PORT command used by FTP to transfer data in the ACTIVE mode.

Using this technique, an attacker can instruct the FTP server to open a connection to a particular port of a machine that might not be the originating client. Such a situation may allow an attacker to perform a port scan on a target by hiding his own identity. Nmap has an option –b to perform this type of scan. However, most of the FTP servers out there are aware about this attack and are configured accordingly to block such a scan and hence prevent an FTP bounce attack.

In a rare case, if you doubt that someone is trying to perform such an attack on the network, then you may want to use the following filters:

ftp.request.command == "PORT"
ftp.response.code == 226 || ftp.response.code == 426...