Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

FTP Servers

by Stephanie Dunn
June 2, 2016

FTP Servers Dashboard Screenshot

File Transfer Protocol (FTP) is one of the most common methods used today to transfer files between clients and servers. FTP is often used within custom web applications and legacy software. Unfortunately, FTP has also become highly targeted due to the lack of secure authentication, no encryption, and the fact that FTP allows for anonymous connectivity. This dashboard will provide organizations with a comprehensive look at FTP related events, port usage, vulnerabilities, and suspicious FTP activity across the network.

FTP was originally designed as a command-line tool to transfer files across the Internet. The protocol was created in 1971 before most modern graphical user interface (GUI) based operating systems such as Windows or Mac OS X. FTP utilizes two connection modes, an active data mode and a passive command mode. In active mode, the FTP server establishes a data channel from the data port 20 on the FTP server to the FTP client port. The FTP client sends a PORT command to notify the server of client listening ports. These are high numbered ports above port 1024, and are usually blocked by most local firewalls, routers, and other security devices. Passive mode establishes connections only from the FTP client to the server on port 21. This mode requires less configuration changes, and doesn’t require new inbound connections to be made from the FTP client to the server. For passive mode, the FTP client sends a PASV command to the FTP server, and then receives the IP address and port number of the server to establish the connection. 

Some organizations today still utilize FTP client software to transfer files internally, or have incorporated FTP into custom web applications or legacy software that house confidential corporate data. FTP by design is an insecure protocol that transmits data in clear text and has no ability to encrypt traffic. This feature makes it easy for anyone to sniff FTP traffic and easily gain access to FTP account credentials. Using FTP in any capacity can present significant security risks for an organization. Organizations should look to transition to more secure transfer protocols such as SSH, which provides a secure channel for transmitting files across the Internet. To provide an additional layer of protection, organizations should also encrypt files stored on FTP servers, which will help to ensure data confidentially and integrity.

This dashboard can provide security teams with valuable information on FTP network traffic, which can assist in detecting suspicious FTP activity, data leakage, and unauthorized FTP software installed on the network. Components within this dashboard can alert analysts to FTP servers using custom ports or other services using the default FTP server port 21. Security teams can use the information presented within this dashboard to detect and disable systems using anonymous FTP. Having anonymous access enabled allows anyone to access an FTP server without credentials, and can present serious security risks for an organization. Many organizations today access custom or legacy applications that utilize or require FTP access for business purposes. By continuously monitoring both FTP client and server activity, organizations can help to ensure that confidential data is being transferred in a secure manner.

This dashboard is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboard can be easily located in the Tenable.sc Feed under the category Discovery & Detection. The dashboard requirements are: 

  • Tenable.sc 5.3.2
  • Nessus 8.6.0
  • LCE 6.0.0
  • NNM 5.9.0
  • Compliance Data

Only Tenable can automatically analyze information from active scanning, intelligent connectors, agent scanning, passive listening, and host data. Active scanning periodically examines hosts to determine the level of risk posed to the organization. Intelligent connectors leverage other security investments in the environment to integrate security data in order to improve context and analysis. Agent scanning enables organizations to rapidly assess hosts without the need for credentials. Passive listening detects hosts that were offline during active scans, and provides real-time monitoring to collect information about each host and how the hosts are communicating on the network. Host data is analyzed and monitored to correlate real-time events and identify malicious activity and anomalous behavior from users, operating systems, network devices, and other critical infrastructure. Each sensor delivers continuous visibility and critical context, enabling decisive action that transforms a security program from reactive to proactive.

The following components are included in this dashboard:

  • FTP Servers – FTP Client/Server Vulnerabilities: The FTP Client/Server Vulnerabilities chart provides an overview of FTP client and server vulnerabilities. This chart detects FTP plugins using active scanning and passive listening to identify FTP traffic during and in between scans. Analysts can use the information presented within this chart to detect and remediate FTP related vulnerabilities. This chart can be modified based on organizational needs.
  • FTP Servers - Suspicious FTP Activity: The Suspicious FTP Activity matrix component highlights the percentage of FTP servers that have anonymous FTP login enabled, contain potentially copyrighted material, and run on ports other than port 21. The component also includes publicly exploitable FTP related vulnerabilities. Additional rows can be added to highlight FTP service characteristics and properties that are of interest. 
  • FTP Servers - FTP Vulnerabilities By Host: The FTP Vulnerabilities By Host table presents a list of hosts with FTP related vulnerabilities. Information within this table includes Critical, High, Medium, and Low severity level vulnerabilities, and is sorted by score. The Common Vulnerability Scoring System (CVSS) is an open industry standard for assessing the severity of vulnerabilities. CVSS scores are assigned to vulnerabilities, allowing organizations to prioritize resources according to the score. The scores range from 0 to 10. Vulnerabilities with a base score in the range 7.0-10.0 are critical, those in the range 4.0-6.9 are major, and those in the range 0.0-3.9 are minor. The CVSS scores correspond to the Tenable severity levels as follows: 10.0 = Critical severity, 7.0-9.9 = High, 4.0-6.9 = Medium, and 0.0-3.9 = Low. This information can help organizations to assess and prioritize current risks. 
  • FTP Servers - Unusual FTP Port Sessions: The Unusual FTP Port Sessions chart presents a 72-hour trend of non-standard FTP port activity and non-FTP activity over port 21 on the network. Activity from non-standard FTP ports relies upon NNM detections that alert when hosts are running non-FTP traffic over port 21. This type of traffic may indicate FTP activity using custom ports. Non-FTP traffic over port 21 may indicate applications using port 21 to communicate across the network. Many applications can be configured to use a default or customized port number. Organizations should note any web applications, FTP servers, or services utilizing custom ports.
  • FTP Servers – FTP Server Port Activity: The FTP Server Port Activity table presents a port summary of FTP Server activity. Using the Nessus plugin 10092, organizations will be able to detect FTP servers utilizing custom ports, along with active and passive FTP connections. In active mode, the FTP server establishes a data channel from the data port 20 on the FTP Server to the FTP client port. The FTP client sends a PORT command to notify the server of client listening ports. These are high numbered ports above port 1024, and are usually blocked by most local firewalls, routers, and other security devices. Passive mode establishes connections only from the FTP client to the server on port 21. This mode requires less configuration changes, and doesn’t require new inbound connections to be made from the FTP client to the server. For passive mode, the FTP client sends a PASV command to the FTP server, and then receives the IP address and port number of the server to establish the connection. Analysts can use the information presented within this table to monitor FTP activity and detect custom FTP ports in use. 
  • FTP Servers - Anonymous FTP Enabled Hosts: The Anonymous FTP Enabled Hosts table reports on systems that have anonymous FTP logins enabled. Having anonymous access enabled allows anyone to access an FTP server without credentials, and can present serious security risks for an organization. Security teams can use the information presented within this table to detect and disable systems using anonymous FTP. Analysts and security teams should continuously monitor FTP servers to ensure that sensitive content is not being transferred in clear text.
  • FTP Servers - FTP Compliance Checks: The FTP Compliance Checks component provides a summary of FTP related compliance checks. Many organizations are required to follow compliance regulations, such as PCI DSS, which require monitoring and configuring FTP securely as a part of compliance objectives. This table uses the FTP, FTP Client, and FTP Server plugin families and the “Compliance” plugin type to highlight FTP compliance check results. High severity denotes checks that have failed to meet the compliance threshold. Medium severity shows checks that need to be manually reviewed to assess their compliance state. Organizations should review current security policies and compliance requirements that are relevant to the organization. Each compliance check includes detailed information on the respective vulnerability that the analyst can immediately drill down into. The analyst can drill down to obtain IP addresses, possible solutions, and additional information to aid with compliance.
  • Web Plugin Family Indicator - FTP Client/Server Detection: The FTP Client/Server Detection matrix present indicators that alert when FTP clients and servers have been detected on the network. FTP services in an organization are commonly set up for a very specific purpose. Analysts should be aware of FTP services that may be operating in the organization, as well as the type of FTP services. This component contains indicators that turn purple when the particular FTP client or server is detected on the network.
  • FTP Servers - FTP File Transfer Detection: The FTP File Transfer Detection table reports on systems hosting files on an FTP server. This component detects commonly used file formats and applications such as PDF, ZIP, RTF, and Microsoft Office based files. Organizations can use the information within this table to ensure that hosted files do not contain confidential data. This table can be modified to include specific or additional information per organizational requirements.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training