#LinuxServer
- FTP is not very secure by default. So we'll install SSH to make it secure.
Connecting to the server with ssh:
apt install proftpdto the server- go to /etc/proftpd and create a copy of proftpd.conf like proftpd.conf.original with
cp /home/user/proftpd.conf /home/user/proftpd.conf.original - copy the edited proftpd.conf file of the Prof inside the etc/proftpd with
cp /home/user/proftpd.conf /etc/proftpd/
Go to the client's terminal;
- open wireshark with
sudo wiresharkon a different terminal window and start the following of the ens33 - connect to the ftp through the original terminal file with
ftpcommand - in ftp enter
open - enter the ip address of the srvlx01 which is
192.168.3.101in our case - enter the password
- going back to wireshark filtering ftp and we can see the password and the username of the ftp easily on the results, which is not secure at all.
- ![[Pasted image 20240328142842.png]]