paint-brush
Exploiting the proftpd Linux Serverby@fatman
12,110 reads
12,110 reads

Exploiting the proftpd Linux Server

by Scott EggimannSeptember 21st, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

This behind-the-scenes walkthrough serves as a great example showing how Linux servers are exploited if you don’t keep them patched and up-to-date. We’ll learn how threat actors use Reconnaissance, Scan, Obtain Access, Exfiltrate data, Maintain Persistance and Pivot while compromising a Linux system. Each open port is vulnerable to a potential attack.
featured image - Exploiting the proftpd Linux Server
Scott Eggimann HackerNoon profile picture
Scott Eggimann

Scott Eggimann

@fatman

L O A D I N G
. . . comments & more!

About Author

Scott Eggimann HackerNoon profile picture
Scott Eggimann@fatman

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite