From the course: Cisco CCNP SCOR Security (350-701) Cert Prep: 3 Endpoint Protection and Secure Access

Unlock this course with a free trial

Join today to access over 22,500 courses taught by industry experts.

File transfer protocols

File transfer protocols

- [Instructor] File Transfer Protocols include many methods for transferring files reliably to remote hosts. In fact, we often use these frequently to exfiltrate data and other files in an unmalicious manner, such as using FTP, SSH, Secure FTP, and the Secure Copy Protocol. Many of these are commonly used for transferring files to infrastructure devices or web servers. This is another vector that attackers frequently use to exfiltrate data to their own servers as well. Many Operating Systems come with built in File Transfer Protocols, such as the FTP functionality that we see in windows and Linux systems via command line. The fact that FTP is built into many Operating Systems by default makes this an enticing vector for data exfiltration, because this means the attacker doesn't need to install any additional software on the client device that might be detected instead they just need to gain access to the device through perhaps Social Engineering. One common technique for FTP data…

Contents