From the course: Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
Unlock this course with a free trial
Join today to access over 24,800 courses taught by industry experts.
File transfer protocols
From the course: Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
File transfer protocols
- [Instructor] File transfer protocols include many methods for transferring files reliably to remote hosts. In fact, we often use these frequently to exfiltrate data and other files in an un-malicious manner, such as using FTP, SSH, secure FTP, and the secure copy protocol. Many of these are commonly used for transferring files to infrastructure devices or web servers. This is another vector that attackers frequently use to exfiltrate data to their own servers as well. Many operating systems come with built-in file transfer protocols, such as the FTP functionality that we see in Windows and Linux systems via command line. The fact that FTP is built into many operating systems by default, makes this an enticing vector for data exfiltration because this means the attacker doesn't need to install any additional software on the client device that might be detected. Instead, they just need to gain access to the device through perhaps social engineering. One common technique for FTP data…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
Guest services6m 48s
-
(Locked)
Profiling7m 32s
-
(Locked)
BYOD policies5m 52s
-
(Locked)
802.1X11m 11s
-
(Locked)
MAB4m 56s
-
(Locked)
WebAuth7m 43s
-
(Locked)
DNS tunneling3m 15s
-
(Locked)
HTTPS3m 50s
-
(Locked)
Email3m 12s
-
(Locked)
File transfer protocols3m 54s
-
(Locked)
ICMP4m 8s
-
(Locked)
NTP3m 34s
-
(Locked)
Cisco Stealthwatch6m 58s
-
(Locked)
Cisco Stealthwatch cloud5m 53s
-
(Locked)
Cisco pxGrid4m 10s
-
(Locked)
Cisco CTA and ETA6m 23s
-
(Locked)
Cisco AnyConnect Network Visibility Module (NVM)3m 26s
-
(Locked)
-