target.com to actually attacker.com.
This is how the FTP bounce attack is performed.
How to prevent the FTP bounce attack?
A commonly used countermeasure is to configure the FTP server not to allow connections to be established with any other host other than the FTP client.
The above article gives a brief overview of the FTP bounce attack. Interested readers who want to know more about different web application vulnerabilities may want to refer to the book “Web Application Vulnerabilities And Prevention.”






0 Comments