FTP

The FTP Service was running zFTP Server 6.0, which upon searching the version in searchsploit returned an interesting result.

My mind was telling me, if we can perform directory transversal maybe we would come across the credentials for web application or the hashes for the admin zFTP User which is being hosted in another port.

I tried to use the exploit but I could not get it to work, so I moved on to a different path. This is where I checked out the different files we are allowed to get as an anonymous user.

This is where everything went cold for me and I started wandering around a lot, I was not able to realize that this was some form of Information Disclousure which I could use to use as hints for bruteforcing.

Last updated