How to Demonstrate FTP Vulnerabilities Using Wireshark (For Educational Purposes Only)

Disclaimer: This article is for educational purposes only. Do not attempt any of the procedures outlined here on systems or servers without explicit permission from the owner. Always conduct cybersecurity tests within legal boundaries and in safe, controlled environments.


Introduction

Understanding how insecure protocols like FTP (File Transfer Protocol) work can help us better defend against online threats. FTP is a basic method of transferring files over a network, but it lacks encryption—making data transfers, including usernames and passwords, vulnerable to interception.

This article walks you through a demonstration of FTP’s insecurity using Windows, Kali Linux, and Wireshark. The goal is to expose the risks of using unencrypted protocols and emphasize the importance of using secure alternatives like SFTP.


Step 1: Enable FTP Service on Windows

Before any demonstration can begin, you need to activate the FTP server on a Windows machine.

  1. Open Control Panel on your Windows computer.
  2. Go to Programs and Features.
  3. On the left panel, click on “Turn Windows features on or off.”
  4. Find and expand Internet Information Services (IIS).
  5. Expand the FTP Server option and check FTP Service.
  6. Click OK to begin installation—this will take just a few moments.

Step 2: Find Your Windows IP Address

To connect to your FTP server from another device, you’ll need the IP address of the Windows machine:

  • Open Command Prompt on your Windows device.
  • Type ipconfig and press Enter.
  • Note the IPv4 Address listed. This is the address your FTP client will connect to.

Step 3: Connect to the FTP Server from Kali Linux

From a Kali Linux device, open the terminal and connect to the Windows FTP server:

ftp <IP address>

Replace <IP address> with the actual IP from the previous step.

You will be prompted to enter a username and password (pre-configured on the Windows FTP server). Once authenticated, you’ll gain access to the server’s file directory.

  • Use the cd command to navigate to the *C:* drive.
  • You will now be able to browse visible files on the server.

This highlights how easily accessible FTP servers can be—especially if weak credentials are used.


Step 4: Start Wireshark to Capture FTP Traffic

Now, to truly reveal the vulnerabilities of FTP, use Wireshark to capture network traffic:

  1. Open a terminal in Kali Linux.
  2. Run Wireshark with root privileges:
sudo wireshark
  1. In Wireshark:
    • Choose the Ethernet interface (usually eth0).
    • Click Capture > Start.
  2. Leave the capture running in the background.

While Wireshark is active, repeat the FTP login procedure:

ftp <IP address>

As you navigate through the FTP server (e.g., accessing the C drive), all traffic between the Kali Linux client and the Windows FTP server is being captured.


Step 5: Analyze Captured FTP Packets

Once done with FTP activities, return to Wireshark and stop the capture. Now let’s analyze the captured data.

  1. In the Wireshark filter bar, type:
tcp.port == 21

This filter isolates FTP traffic, which uses TCP port 21.

  1. Locate the first packet labeled as FTP.
  2. Right-click on it and select “Follow” > “TCP Stream”.

A new window will appear, revealing the full conversation between the client and the server. This includes sensitive details such as:

  • FTP username
  • FTP password
  • Commands and file navigation activity

This vividly demonstrates how FTP sends data in plain text, making it vulnerable to interception.


Step 6: Secure Your Connection with SFTP

The solution to FTP’s security flaws is to avoid using FTP altogether. Instead, opt for:

  • SFTP (Secure File Transfer Protocol): Encrypts all data, including credentials.
  • FTPS (FTP Secure): FTP over SSL/TLS, which provides encryption.

Always secure your servers and systems. Avoid outdated and insecure protocols unless testing in a safe, controlled environment with permission.


Conclusion

FTP is an outdated protocol that exposes sensitive data during transmission. This demonstration clearly shows how easy it is to intercept usernames and passwords using simple tools like Wireshark. As cyber threats evolve, it’s vital to understand both the risks and how to mitigate them.

Always use secure alternatives such as SFTP, and ensure proper network security practices are followed to protect your digital environment.


Tags: ftp, sftp, wireshark, ftp vulnerability, network security, ethical hacking, kali linux, windows ftp server, cyber security, secure file transfer, wireshark tutorial, network monitoring, tcp port 21, tcp stream analysis

Hashtags: #FTP #Wireshark #NetworkSecurity #EthicalHacking #CyberSecurity #SFTP #KaliLinux #TCP #PacketSniffing #DigitalDefense

Visited 37 times, 1 visit(s) today

Rakesh Bhardwaj

Rakesh Bhardwaj is a seasoned editor and designer with over 15 years of experience in the creative industry. He specializes in crafting visually compelling and professionally polished content, blending precision with creativity. Whether refining written work or designing impactful visuals, Rakesh brings a deep understanding of layout, typography, and narrative flow to every project he undertakes.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.