CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/scanner/portscan/ftpbounce.md
Views: 11655

Vulnerable Application

Enumerate TCP services via the FTP bounce PORT/LIST method

Verification Steps

  1. Start msfconsole

  2. Do: use modules/auxiliary/scanner/portscan/ftpbounce

  3. Do: set BOUNCEHOST [ip]

  4. Do: set PORTS [number(s)]

  5. Do: set RHOSTS [ip]

  6. Do: set FTPUSER [user]

  7. Do: set FTPPASS [password]

  8. Do: run

Scenarios

Docker Usage: docker run -e "ADDED_FLAGS=-w -W -d -d" -e FTP_USER_NAME=bob -e FTP_USER_PASS=12345 -e FTP_USER_HOME=/home/bob stilliard/pure-ftpd

PureFTPd and Kali Linux 2019.3

msf > use modules/auxiliary/scanner/portscan/ftpbounce msf auxiliary(scanner/portscan/ftpbounce) > set BOUNCEHOST 172.17.0.2 BOUNCEHOST => 172.17.0.2 msf auxiliary(scanner/portscan/ftpbounce) > set PORTS 8080 BOUNCEPORT => 8080 msf auxiliary(scanner/portscan/ftpbounce) > set RHOSTS 172.17.0.4 RHOSTS => 172.17.0.4 msf auxiliary(scanner/portscan/ftpbounce) > set FTPUSER bob FTPUSER => bob msf auxiliary(scanner/portscan/ftpbounce) > set FTPPASS 12345 FTPPASS => 12345 msf auxiliary(scanner/portscan/ftpbounce) > run [+] 172.17.0.2:21 - TCP OPEN 172.17.0.4:8080 [*] 172.17.0.2:21 - Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed

Manual Exploitation

root@ubuntu:~# nmap -p 8080 -v -b bob:12345@172.17.0.2 172.17.0.4 -Pn Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-25 20:34 UTC Resolved FTP bounce attack proxy to 172.17.0.2 (172.17.0.2). Initiating Parallel DNS resolution of 1 host. at 20:34 Completed Parallel DNS resolution of 1 host. at 20:34, 0.00s elapsed Attempting connection to ftp://bob:[email protected]:21 Connected:220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220-You are user number 1 of 5 allowed. 220-Local time is now 20:34. Server port: 21. 220-This is a private system - No anonymous login 220-This server supports FXP transfers 220-IPv6 connections are also welcome on this server. 220 You will be disconnected after 15 minutes of inactivity. Login credentials accepted by FTP server! Initiating Bounce Scan at 20:34 Discovered open port 8080/tcp on 172.17.0.4 Completed Bounce Scan at 20:34, 0.00s elapsed (1 total ports) Nmap scan report for 172.17.0.4 Host is up. PORT STATE SERVICE 8080/tcp open http-proxy