TY - GEN
T1 - Warezmaster and Warezclient
T2 - 8th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2017
AU - Dey, Debdeep
AU - DInda, Archisman
AU - Kundapur, Poornima Panduranga
AU - Smitha, R.
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/12/13
Y1 - 2017/12/13
N2 - Although the File Transfer Protocol (FTP) was not designed with strict security measures in place, which is quite evident from the fact that all the commands and data are transmitted in clear text, subsequent additions to the protocol have implemented security features like upgrading the connection to Transport Layer Security (TLS) in FTPS. In spite of such developments, FTP remains an inherently insecure protocol, that refuses to die. The FTP, despite its quirks, has proven to be extremely resilient. As of 2015, more than 13 million FTP servers exist in the Internet Protocol Version 4 (IPv4) address space. With the advent of the Internet of Things (IoT) and the proliferation of internet enabled hand held devices, the security of computer networks has become a very important issue. There are two broad divisions of security threats, Remote exploits and local attacks. Remote to local attacks are a serious threat to computer networks. In this paper, we implement two specific remote to local attacks, the Warezmaster (WM) and the Warezclient attack (WC), which exploit the vulnerabilities present in 'anonymous' FTP on both Linux and Windows. We then go on to discuss the ramifications of such an attack, it's limitations as well as the methods to prevent such attacks.
AB - Although the File Transfer Protocol (FTP) was not designed with strict security measures in place, which is quite evident from the fact that all the commands and data are transmitted in clear text, subsequent additions to the protocol have implemented security features like upgrading the connection to Transport Layer Security (TLS) in FTPS. In spite of such developments, FTP remains an inherently insecure protocol, that refuses to die. The FTP, despite its quirks, has proven to be extremely resilient. As of 2015, more than 13 million FTP servers exist in the Internet Protocol Version 4 (IPv4) address space. With the advent of the Internet of Things (IoT) and the proliferation of internet enabled hand held devices, the security of computer networks has become a very important issue. There are two broad divisions of security threats, Remote exploits and local attacks. Remote to local attacks are a serious threat to computer networks. In this paper, we implement two specific remote to local attacks, the Warezmaster (WM) and the Warezclient attack (WC), which exploit the vulnerabilities present in 'anonymous' FTP on both Linux and Windows. We then go on to discuss the ramifications of such an attack, it's limitations as well as the methods to prevent such attacks.
UR - https://www.scopus.com/pages/publications/85041408430
UR - https://www.scopus.com/inward/citedby.url?scp=85041408430&partnerID=8YFLogxK
U2 - 10.1109/ICCCNT.2017.8203964
DO - 10.1109/ICCCNT.2017.8203964
M3 - Conference contribution
AN - SCOPUS:85041408430
T3 - 8th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2017
BT - 8th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2017
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 3 July 2017 through 5 July 2017
ER -