Module 13 Hacking Web Servers
Module 13 Hacking Web Servers
Hackers attack web servers to steal credentials, passwords, and business information. They do this using DoS, DDoS, DNS server hijacking,
DNS amplification, directory traversal, Man-in-the-Middle (MITM), sniffing, phishing, website defacement, web server misconfiguration,
HTTP response splitting, web cache poisoning, SSH brute force, web server password cracking, and other methods. Attackers can exploit a
poorly configured web server with known vulnerabilities to compromise the security of the web application. A leaky server can harm an
organization.
In the area of web security, despite strong encryption on the browser-server channel, web users still have no assurance about what
happens at the other end. This module presents a security application that augments web servers with trusted co-servers composed of
high-assurance secure co-processors, configured with a publicly known guardian program. Web users can then establish their
authenticated, encrypted channels with a trusted co-server, which can act as a trusted third party in the browser-server interaction.
Systems are constantly being attacked, so IT security professionals need to be aware of the common attacks on web server applications.
A penetration (pen) tester or ethical hacker for an organization must provide security to the company’s web server. This includes
performing checks on the web server for vulnerabilities, misconfigurations, unpatched security flaws, and improper authentication with
external systems.
Objective
The objective of this lab is to perform web server hacking and other tasks that include, but are not limited to:
Footprint a web server using various information-gathering tools and inbuilt commands
Enumerate web server information
Crack remote passwords
Lab Tasks
Ethical hackers or pen testers use numerous tools and techniques to hack a target web server. Recommended labs that will assist you in
learning various web server hacking techniques include:
https://www.cyberq.io/vm/document 1/61
16/11/23, 21:02 CyberQ
The first step of hacking web servers for a professional ethical hacker or pen tester is to collect as much information as possible about the
target web server and analyze the collected information in order to find lapses in its current security mechanisms. The main purpose is to
learn about the web server’s remote access capabilities, its ports and services, and other aspects of its security.
The information obtained in this step helps in assessing the security posture of the web server. Footprinting may involve searching the
Internet, newsgroups, bulletin boards, etc. for gathering information about the target organization’s web server. There are also tools such
as Whois.net and Whois Lookup that extract information such as the target’s domain name, IP address, and autonomous system number.
Web server fingerprinting is an essential task for any penetration tester. Before proceeding to hack or exploit a webserver, the penetration
tester must know the type and version of the webserver as most of the attacks and exploits are specific to the type and version of the
server being used by the target. These methods help any penetration tester to gain information and analyze their target so that they can
perform a thorough test and can deploy appropriate methods to mitigate such attacks on the server.
An ethical hacker or penetration tester must perform footprinting to detect the loopholes in the web server of the target organization.
This will help in predicting the effectiveness of additional security measures for strengthening and protecting the web server of the target
organization.
The labs in this exercise demonstrate how to footprint a web server using various footprinting tools and techniques.
Lab Objectives
By performing web server footprinting, it is possible to gather valuable system-level data such as account details, OS, software versions,
server names, and database schema details. Use Telnet utility to footprint a web server and gather information such as server name, server
type, OSes, and applications running. Use footprinting tools such as Netcraft, ID Serve, and httprecon to perform web server footprinting.
Web server footprinting tools such as Netcraft, ID Serve, and httprecon can extract information from the target server. Let us look at the
features and the types of information these tools can collect from the target server.
Ghost Eye gathers information such as Whois lookup, DNS lookup, EtherApe, Nmap port scan, HTTP header grabber, Clickjacking test,
Robots.txt scanner, Link grabber, IP location finder, and traceroute.
https://www.cyberq.io/vm/document 2/61
16/11/23, 21:02 CyberQ
2. In the login page, the attacker username will be selected by default. Enter password as toor in the Password field and press Enter
to log in to the machine.
3. Click the MATE Terminal icon at the top of the Desktop window to open a Terminal window.
https://www.cyberq.io/vm/document 3/61
16/11/23, 21:02 CyberQ
Note: If a Question pop-up window appears asking for you to update the machine, click No to close the window.
4. A Parrot Terminal window appears. In the terminal window, type sudo su and press Enter to run the programs as a root user.
5. In the [sudo] password for attacker field, type toor as a password and press Enter.
6. Now, navigate to the Ghost Eye directory. Type cd ghost_eye and press Enter.
7. In the terminal window, type pip3 install -r requirements.txt and press Enter.
https://www.cyberq.io/vm/document 4/61
16/11/23, 21:02 CyberQ
9. The Ghost Eye - Information Gathering Tool options appear, as shown in the screenshot.
https://www.cyberq.io/vm/document 5/61
16/11/23, 21:02 CyberQ
10. Let us perform a Whois Lookup. Type 3 for the Enter your choice: option and press Enter.
11. Type certifiedhacker.com in the Enter Domain or IP Address: field and press Enter
12. Scroll up to see the certifiedhacker.com result. In the result, observe the complete information of the certifiedhacker.com domain
such as Domain Name, Registry Domain ID, Registrar WHOIS Server, Registrar URL, and Updated Date.
https://www.cyberq.io/vm/document 6/61
16/11/23, 21:02 CyberQ
13. Let us perform a DNS Lookup on certifiedhacker.com. In the Enter your choice field, type 2 and press Enter to perform DNS
Lookup.
14. The Enter Domain or IP Address field appears; type certifiedhacker.com, and press Enter.
https://www.cyberq.io/vm/document 7/61
16/11/23, 21:02 CyberQ
15. As soon as you hit Enter, Ghost Eye starts performing a DNS Lookup on the targeted domain (here, certifiedhacker.com).
17. Now, perform the Clickjacking Test. Type 6 in the Enter your choice field and press Enter.
18. In the Enter the Domain to test field, type certifiedhacker.com and press Enter.
https://www.cyberq.io/vm/document 8/61
16/11/23, 21:02 CyberQ
19. By performing this test, Ghost Eye will provide the complete architecture of the web server, and also reveal whether the domain is
vulnerable to Clickjacking attacks or not.
https://www.cyberq.io/vm/document 9/61
16/11/23, 21:02 CyberQ
20. Similarly, you can use the other tools available with Ghost Eye such as Nmap port scan, HTTP header grabber, link grabber, and
Robots.txt scanner to gather information about the target web server.
21. This concludes the demonstration of how to gather information about a target web server using Ghost Eye.
1. Click CEHv12 Windows Server 2022 to switch to the Windows Server 2022 machine.
2. Click Ctrl+Alt+Del to activate the machine. By default, CEH\Administrator user profile is selected, type Pa$$w0rd in the Password
field and press Enter to login.
https://www.cyberq.io/vm/document 10/61
16/11/23, 21:02 CyberQ
3. Click Type here to search field and type wamp. Wamperserver64 appears in the result, press Enter to launch it.
4. Wait until the WAMP Server icon turns Green in the Notification area. Leave the Windows Server 2022 machine running.
https://www.cyberq.io/vm/document 11/61
16/11/23, 21:02 CyberQ
6. Click the MATE Terminal icon at the top of the Desktop window to open a Terminal window.
https://www.cyberq.io/vm/document 12/61
16/11/23, 21:02 CyberQ
7. A Parrot Terminal window appears. In the terminal window, type sudo su and press Enter to run the programs as a root user.
8. In the [sudo] password for attacker field, type toor as a password and press Enter.
9. Now, perform security reconnaissance on a web server using Skipfish. The target is the WordPress website http://[IP Address of
Windows Server 2022].
10. Specify the output directory and load a dictionary file based on the web server’s requirement. In this lab, we are naming the output
directory test.
https://www.cyberq.io/vm/document 13/61
16/11/23, 21:02 CyberQ
12. On receiving this command, Skipfish performs a heavy brute-force attack on the web server by using the complete.wl dictionary
file, creates a directory named test in the root location, and stores the result in index.html inside this location.
13. Before beginning a scan, Skipfish displays some tips. Press Enter to start the security reconnaissance.
https://www.cyberq.io/vm/document 14/61
16/11/23, 21:02 CyberQ
15. Let the Skipfish run the scan for 5 minutes and after that press Ctrl+C to terminate the scan.
https://www.cyberq.io/vm/document 15/61
16/11/23, 21:02 CyberQ
16. On completion of the scan, Skipfish generates a report and stores it in the test directory (in the /home/attacker/ location). Click
Places from the top-section of the Desktop and click Home Folder from the drop-down options.
https://www.cyberq.io/vm/document 16/61
16/11/23, 21:02 CyberQ
18. Right-click index.html, hover your mouse cursor on Open With, and click Firefox to view the scan result.
19. The Skipfish crawl result appears in the web browser, displaying a summary overview of document and issue types found, as shown
in the screenshot.
https://www.cyberq.io/vm/document 17/61
16/11/23, 21:02 CyberQ
20. Expand each node to view detailed information regarding the result.
21. Analyze an issue found in the web server. To do this, click a node under the Issue type overview section to expand it.
https://www.cyberq.io/vm/document 18/61
16/11/23, 21:02 CyberQ
23. Observe the URL of the webpage associated with the vulnerability. Click the URL.
25. The PHP version webpage appears, displaying details related to the machine, as well as the other resources associated with the web
server infrastructure and PHP configuration.
26. Switch back to the first tab and click show trace next to the URL to examine the vulnerability in detail.
https://www.cyberq.io/vm/document 20/61
16/11/23, 21:02 CyberQ
27. An HTTP trace window appears on the webpage, displaying the complete HTML session, as shown in the screenshot.
Note: If the window does not properly appear, hold down the Ctrl key and click the link.
28. Examine other vulnerabilities and patch them to secure the web server.
29. This concludes the demonstration of how to gather information about a target web server using Skipfish.
30. Close all open windows on both the Parrot Security and Windows Server 2022 machines.
httprecon is a tool for advanced web server fingerprinting. This tool performs banner-grabbing attacks, status code enumeration, and
header ordering analysis on its target web server.
Here, we will use the httprecon tool to gather information about a target web server.
2. By default, Admin user profile is selected, type Pa$$w0rd in the Password field and press Enter to login.
Note: Networks screen appears, click Yes to allow your PC to be discoverable by other PCs and devices on the network.
https://www.cyberq.io/vm/document 21/61
16/11/23, 21:02 CyberQ
3. Navigate to E:\CEH-Tools\CEHv12 Module 13 Hacking Web Servers\Web Server Footprinting Tools\httprecon, right-click
httprecon.exe, and, from the context menu, click Run as administrator double-click to launch the application.
4. Main window of httprecon appears, enter the website URL (here, www.certifiedhacker.com) that you want to footprint and select
port number (80) in the Target section.
https://www.cyberq.io/vm/document 22/61
16/11/23, 21:02 CyberQ
https://www.cyberq.io/vm/document 23/61
16/11/23, 21:02 CyberQ
7. Look at the Get existing tab, and observe the server (nginx) used to develop the webpages.
8. When attackers obtain this information, they research the vulnerabilities present in nginx and try to exploit them, which results in
either full or partial control over the web application.
9. Click the GET long request tab, which lists all GET requests. Next, click the Fingerprint Details tab.
10. The details displayed in the screenshot above include the name of the protocol the website is using and its version.
11. By obtaining this information, attackers can manipulate HTTP vulnerabilities in order to perform malicious activities such as sniffing
over the HTTP channel, which might result in revealing sensitive data such as user credentials.
12. This concludes the demonstration of how to gather information about the target web server using httprecon.
ID Serve is a simple Internet server identification utility. Following is a list of its capabilities:
1. Click CEHv12 Windows 11 to switch to the Windows 11 machine, navigate to E:\CEH-Tools\CEHv12 Module 13 Hacking Web
Servers\Web Server Footprinting Tools\ID Serve and double-click idserve.exe.
2. The main window of ID Serve appears. By default, the Server Query tab appears.
https://www.cyberq.io/vm/document 24/61
16/11/23, 21:02 CyberQ
3. For option 1, in the Enter or copy/paste an Internet server URL or IP address section, enter the URL
(http://www.certifiedhacker.com) you want to footprint.
5. After the completion of the query, ID Serve displays the results of the entered website, as shown in the screenshot.
https://www.cyberq.io/vm/document 25/61
16/11/23, 21:02 CyberQ
6. After obtaining this information, the attacker may perform a vulnerability analysis on that particular version of the web server and
implement various techniques to perform exploitation.
Netcat is a networking utility that reads and writes data across network connections, using the TCP/IP protocol. It is a reliable “back-end”
tool used directly or driven by other programs and scripts. It is also a network debugging and exploration tool.
Telnet
Telnet is a client-server network protocol. It is widely used on the Internet or LANs. It provides the login session for a user on the Internet.
The single terminal attached to another computer emulates with Telnet. The primary security problems with Telnet are the following:
Telnet helps users perform banner-grabbing attacks. It probes HTTP servers to determine the Server field in the HTTP response header.
2. Click the MATE Terminal icon from the menu bar to launch the terminal.
https://www.cyberq.io/vm/document 26/61
16/11/23, 21:02 CyberQ
3. A Parrot Terminal window appears. In the terminal window, type sudo su and press Enter to run the programs as a root user.
4. In the [sudo] password for attacker field, type toor as a password and press Enter.
https://www.cyberq.io/vm/document 27/61
16/11/23, 21:02 CyberQ
6. Once you hit Enter, the netcat will display the hosting information of the provided domain, as shown in the screenshot.
8. Netcat will perform the banner grabbing and gather information such as content type, last modified date, accept ranges, ETag, and
server information.
https://www.cyberq.io/vm/document 28/61
16/11/23, 21:02 CyberQ
9. In the terminal windows, type clear and press Enter to clear the netcat result in the terminal window.
10. Now, perform banner grabbing using telnet. In the terminal window, type telnet www.moviescope.com 80 and press Enter.
https://www.cyberq.io/vm/document 29/61
16/11/23, 21:02 CyberQ
12. Now, type GET / HTTP/1.0 and press Enter twice. Telnet will perform the banner grabbing and gather information such as content
type, last modified date, accept ranges, ETag, and server information.
https://www.cyberq.io/vm/document 30/61
16/11/23, 21:02 CyberQ
13. This concludes the demonstration of how to gather information about the target web server using the Netcat and Telnet utilities.
Nmap, along with Nmap Scripting Engine, can extract a lot of valuable information from the target web server. In addition to Nmap
commands, Nmap Scripting Engine (NSE)provides scripts that reveal various useful information about the target web server to an attacker.
1. On to the Parrot Security machine, click the MATE Terminal icon from the menu bar to launch the terminal.
2. A Parrot Terminal window appears. In the terminal window, type sudo su and press Enter to run the programs as a root user.
3. In the [sudo] password for attacker field, type toor as a password and press Enter.
https://www.cyberq.io/vm/document 31/61
16/11/23, 21:02 CyberQ
4. Enumerate the directories used by web servers and web applications, in the terminal window. Type nmap -sV --script=http-enum
[target website] and press Enter.
https://www.cyberq.io/vm/document 32/61
16/11/23, 21:02 CyberQ
6. This script enumerates and provides you with the output details, as shown in the screenshot.
7. The next step is to discover the hostnames that resolve the targeted domain.
8. In the terminal window, type nmap --script hostmap-bfk -script-args hostmap-bfk.prefix=hostmap- www.goodshopping.com
and press Enter.
https://www.cyberq.io/vm/document 33/61
16/11/23, 21:02 CyberQ
9. Perform an HTTP trace on the targeted domain. In the terminal window, type nmap --script http-trace -d
www.goodshopping.com and press Enter.
10. This script will detect a vulnerable server that uses the TRACE method by sending an HTTP TRACE request that shows if the method
is enabled or not.
https://www.cyberq.io/vm/document 34/61
16/11/23, 21:02 CyberQ
https://www.cyberq.io/vm/document 35/61
16/11/23, 21:02 CyberQ
11. Now, check whether Web Application Firewall is configured on the target host or domain. In the terminal window, type nmap -p80 -
-script http-waf-detect www.goodshopping.com and press Enter.
12. This command will scan the host and attempt to determine whether a web server is being monitored by an IPS, IDS, or WAF.
13. This command will probe the target host with malicious payloads and detect the changes in the response code.
https://www.cyberq.io/vm/document 36/61
16/11/23, 21:02 CyberQ
14. This concludes the demonstration of how to enumerate web server information using the Nmap Scripting Engine (NSE).
1. Click CEHv12 Windows Server 2022 to switch to the Windows Server 2022 machine.
https://www.cyberq.io/vm/document 37/61
16/11/23, 21:02 CyberQ
2. Click Ctrl+Alt+Del to activate the machine. By default, CEH\Administrator user profile is selected, type Pa$$w0rd in the Password
field and press Enter to login.
3. Click Type here to search field and type wamp. Wamperserver64 appears in the result, press Enter to launch it.
https://www.cyberq.io/vm/document 38/61
16/11/23, 21:02 CyberQ
4. Wait until the WAMP Server icon turns Green in the Notification area. Leave the Windows Server 2022 machine running.
5. Leave the Windows Server 2022 machine running and switch to the Parrot Security machine.
https://www.cyberq.io/vm/document 39/61
16/11/23, 21:02 CyberQ
6. Now, click CEHv12 Parrot Security to switch to the Parrot Security machine, click the MATE Terminal icon from the menu bar to
launch the terminal.
7. In the [sudo] password for attacker field, type toor as a password and press Enter.
8. In the terminal window, type uniscan -h and hit Enter to display the uniscan help options.
9. The help menu appears, as shown in the screenshot. First, use the -q command to search for the directories of the web server.
https://www.cyberq.io/vm/document 40/61
16/11/23, 21:02 CyberQ
10. In the terminal window, type uniscan -u http://10.10.1.22:8080/CEH -q and hit Enter to start scanning for directories.
11. Here, 10.10.1.22 is the IP address of the Windows Server 2022 machine. This may vary in your lab environment.
12. In the above command, the -u switch is used to provide the target URL, and the -q switch is used to scan the directories in the web
server.
https://www.cyberq.io/vm/document 41/61
16/11/23, 21:02 CyberQ
13. Uniscan starts performing different tests on the webserver and discovering web directories, as shown in the screenshot.
Note: Analyze the complete output of the scan. It should take approximately 5 minutes for the scan to finish.
https://www.cyberq.io/vm/document 42/61
16/11/23, 21:02 CyberQ
14. Now, run uniscan using two options together. Here -w and -e are used together to enable the file check (robots.txt and
sitemap.xml file). In the terminal window, type uniscan -u http://10.10.1.22:8080/CEH -we and hit Enter to start the scan.
15. Uniscan starts the file check and displays the results, as shown in the screenshot.
Note: Scroll to analyze the complete scan result. It should take approximately 5 minutes for the scan to finish.
https://www.cyberq.io/vm/document 43/61
16/11/23, 21:02 CyberQ
16. Now, use the dynamic testing option by giving the command -d. Type uniscan -u http://10.10.1.22:8080/CEH -d and hit Enter to
start a dynamic scan on the web server.
https://www.cyberq.io/vm/document 44/61
16/11/23, 21:02 CyberQ
17. Uniscan starts performing dynamic tests, obtaining more information about email-IDs, Source code disclosures, and external hosts,
web backdoors, dynamic tests.
Note: Scroll to analyze the complete output of the scan. It should take approximately 18 minutes for the scan to finish.
https://www.cyberq.io/vm/document 45/61
16/11/23, 21:02 CyberQ
https://www.cyberq.io/vm/document 46/61
16/11/23, 21:02 CyberQ
18. Click Places from the top-section of the Desktop and click Home Folder from the drop-down options.
19. Click File System from the left-pane and click usr --> share --> uniscan --> report.
https://www.cyberq.io/vm/document 47/61
16/11/23, 21:02 CyberQ
20. Right-click on 10.10.1.22.html. Hover your mouse cursor on Open With and click Firefox from the menu to view the scan report.
21. The report opens in the browser, giving you all scan details in a more comprehensive manner. Here, you can further analyze the
report in depth.
https://www.cyberq.io/vm/document 48/61
16/11/23, 21:02 CyberQ
22. This concludes the demonstration of how to gather information about the target web server using Uniscan.
After gathering required information about the target web server, the next task for an ethical hacker or pen tester is to attack the web
server in order to test the target network’s web server security infrastructure. This requires knowledge of how to perform web server
attacks.
Attackers perform web server attacks with certain goals in mind. These goals may be technical or non-technical. For example, attackers
may breach the security of the web server to steal sensitive information for financial gain, or merely for curiosity’s sake. The attacker tries
all possible techniques to extract the necessary passwords, including password guessing, dictionary attacks, brute force attacks, hybrid
attacks, pre-computed hashes, rule-based attacks, distributed network attacks, and rainbow attacks. The attacker needs patience, as some
of these techniques are tedious and time-consuming. The attacker can also use automated tools such as Brutus and THC-Hydra, to crack
web passwords.
An ethical hacker or pen tester must test the company’s web server against various attacks and other vulnerabilities. It is important to find
various ways to extend the security test by analyzing web servers and employing multiple testing techniques. This will help to predict the
effectiveness of additional security measures for strengthening and protecting web servers of the organization.
Lab Objectives
Attackers can cause various kinds of damage to an organization by attacking a web server, including:
First, find the open FTP port using Nmap, and then perform a dictionary attack using the THC Hydra tool.
Note: Here, we will use a sample password file (Passwords.txt) containing a list of passwords to crack the FTP credentials on the
target machine.
2. Assume that you are an attacker, and you have observed that the FTP service is running on the Windows 11 machine.
3. Perform an Nmap scan on the target machine (Windows 11) to check if the FTP port is open.
4. Click the MATE Terminal icon at the top of the Desktop window to open a Terminal window.
5. A Parrot Terminal window appears. In the terminal window, type sudo su and press Enter to run the programs as a root user.
6. In the [sudo] password for attacker field, type toor as a password and press Enter.
https://www.cyberq.io/vm/document 50/61
16/11/23, 21:02 CyberQ
7. In the terminal window, type nmap -p 21 [IP Address of Windows 11], and press Enter.
https://www.cyberq.io/vm/document 51/61
16/11/23, 21:02 CyberQ
10. Type ftp [IP Address of Windows 11] and press Enter. You will be prompted to enter user credentials. The need for credentials
implies that an FTP server is hosted on the machine.
11. Try entering random usernames and passwords in an attempt to gain FTP access.
Note: The password you enter will not be visible on the screen.
12. As shown in the screenshot, you will not be able to log in to the FTP server. Close the terminal window.
https://www.cyberq.io/vm/document 52/61
16/11/23, 21:02 CyberQ
13. Now, to attempt to gain access to the FTP server, perform a dictionary attack using the THC Hydra tool.
14. Click Places from the top-section of the Desktop and click Desktop from the drop-down options.
https://www.cyberq.io/vm/document 53/61
16/11/23, 21:02 CyberQ
15. Navigate to CEHv12 Module 13 Hacking Web Servers folder and copy Wordlists folder.
16. Paste the copied folder (Wordlists) on the Desktop. Close the window
https://www.cyberq.io/vm/document 54/61
16/11/23, 21:02 CyberQ
17. Click the MATE Terminal icon at the top of the Desktop window to open a Terminal window.
18. A Parrot Terminal window appears. In the terminal window, type sudo su and press Enter to run the programs as a root user.
https://www.cyberq.io/vm/document 55/61
16/11/23, 21:02 CyberQ
19. In the [sudo] password for attacker field, type toor as a password and press Enter.
Note: The IP address of Windows 11 in this lab exercise is 10.10.1.11. This IP address might vary in your lab environment.
21. Hydra tries various combinations of usernames and passwords (present in the Usernames.txt and Passwords.txt files) on the FTP
server and outputs cracked usernames and passwords, as shown in the screenshot.
22. On completion of the password cracking, the cracked credentials appear, as shown in the screenshot.
https://www.cyberq.io/vm/document 56/61
16/11/23, 21:02 CyberQ
23. Try to log in to the FTP server using one of the cracked username and password combinations. In this lab, use Martin’s credentials to
gain access to the server.
24. In the terminal window, type ftp [IP Address of Windows 11], and press Enter.
25. Enter Martin’s user credentials (Martin and apple) to check whether you can successfully log in to the server.
26. On entering the credentials, you will successfully be able to log in to the server. An ftp terminal appears, as shown in the screenshot.
https://www.cyberq.io/vm/document 57/61
16/11/23, 21:02 CyberQ
27. Now you can remotely access the FTP server hosted on the Windows 11 machine.
28. Type mkdir Hacked and press Enter to remotely create a directory named Hacked on the Windows 11 machine through the ftp
terminal.
https://www.cyberq.io/vm/document 58/61
16/11/23, 21:02 CyberQ
29. Click CEHv12 Windows 11 to switch to the Windows 11 machine and navigate to C:\FTP.
31. You have successfully gained remote access to the FTP server by obtaining the appropriate credentials.
32. Click CEHv12 Parrot Security to switch back to the Parrot Security machine.
33. Enter help to view all other commands that you can use through the FTP terminal.
https://www.cyberq.io/vm/document 59/61
16/11/23, 21:02 CyberQ
34. On completing the task, enter quit to exit the ftp terminal.
35. This concludes the demonstration of how to crack FTP credentials using a dictionary attack and gain remote access to the FTP server.
https://www.cyberq.io/vm/document 60/61
16/11/23, 21:02 CyberQ
36. Close all open windows on both the Parrot Security and Windows 11 machines.
https://www.cyberq.io/vm/document 61/61