|Read this whole guide offline with no ads, for a low price!|
Use coupon code "certiguide" to save 20%!
|Need more practice? 300 additional Security+ questions!|
|Get It Here!|
188.8.131.52 Packet Sniffing
Since vanilla FTP transmits in
clear text, using a packet sniffer to see the data as well as user/password
information is relatively easy to do. In 2.5.1 we mentioned performing
file transfers over SSL or SSH2. Another version of encrypted FTP uses
the freely available BlowFish encryption algorithm (448-bit Encryption
and can be found for free in the footnote230.
With FTP access, a malicious user can upload a virus, or exploit a web server flaw like a buffer overflow, and cause a Denial of Service to legitimate users, or even gain unauthorized access to the server.
Another security vulnerability in FTP is that unless a technology like S/FTP is used, data and user/password information are transferred in clear text form, and can easily be sniffed from the network or even altered during transfer.
|If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!|
Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.