Investigate the FTP Traffic
![15403|636x285](upload://8ISJT7xcALdL84s5XDtMSX9YmY7.jpeg)
![15404|634x148](upload://dPCEARuWA6cOFi6ukQ3IJbiYSZd.jpeg)
In this activity, you will use Packet Tracer to sniff and log network traffic. You will view a security vulnerability in one network application, and view logged ICMP traffic with syslog.
a. Click the Sniffer1 device and then click the GUI tab.
b. Click through some of the first FTP packets in the session. Be sure to scroll down to
view the application layer protocol information in the packet details for each. (This
assumes this is your first FTP session. If you have opened other sessions, clear the window
and repeat the login and file transfer process.)
What is the security vulnerability presented by FTP?
The FTP username and password are transmitted in clear text.
What should be done to mitigate this vulnerability?
Use a secure file transfer protocol such as SFTP.
You might also like to view...
Any software that self-replicates is the definition of logic bomb.
a. true b. false
When an exception occurs in the Try block's code, a description of the exception is stored in the ____________ of the Catch block'sexparameter.
A. Error property B. Exception property C. Message property D. Try property