Page 349 - StudyBook.pdf
P. 349

Communication Security: Web Based Services • Chapter 5  333

                 for making files available to the public over the Internet. However, it also presents a
                 security threat.Anonymous connections to servers running the FTP process allow
                 the attacking station to download a virus, overwrite a file, or abuse trusts that the
                 FTP server has in the same domain.
                    Blind FTP involves making files available to the public only if they know the
                 exact path and file name. By configuring FTP servers so that users are unable to
                 browse the directory structure and their contents, the user is only able to download
                 a file if they know where it is and what it’s called. For example, if a user were
                 going to download a file called blinded.zip that’s stored in the PUBLIC directory
                 on a Web server called ftp.syngress.com, they would use a link to the file that
                 points to ftp://ftp.syngress.com/public/blinded.zip.
                    FTP attacks are best avoided by preventing anonymous logins, stopping unused
                 services on the server, and creating router access lists and firewall rules. If anony-
                 mous logons are required, the best course of action is to update the FTP software
                 to the latest revision and keep an eye on related advisories. It is a good idea to
                 adopt a general policy of regular checks of advisories for all software that you are
                 protecting.

                 FTP Sharing and Vulnerabilities

                 Although FTP is widely used, there are a number of vulnerabilities that should be
                 addressed to ensure security.As we’ll see in Exercise 5.03, FTP authentication is
                 sent as cleartext, making it easy for someone with a packet sniffer to view user-
                 names and passwords. Because hackers and malicious software could be used to
                 obtain this information quite easily, when traffic doesn’t need to cross firewalls or
                 routers on a network, it is important to block ports 20 and 21.
                    Port 21 is the control port for FTP, while port 20 is the data port. FTP uses
                 port 21 to begin a session, accessing the port over TCP to provide a username and
                 password. Because FTP doesn’t use encryption, this information is sent using clear-
                 text, allowing anyone using a packet sniffer to capture the packet and view this
                 information.To avoid such attacks, encryption should be used whenever possible to
                 prevent protocol analyzers from being used to access this data.
                    It is important to be careful with user accounts and their permissions on FTP
                 servers. If users will only be downloading files and don’t require individual
                 accounts, then a server could be configured to allow anonymous access. In doing
                 so, anyone could login to the account without a password, or by using their e-mail
                 address as a password. Not only does this make it easier to distribute files to users,
                 but it also removes the need to worry about authentication information being




                                                                              www.syngress.com
   344   345   346   347   348   349   350   351   352   353   354