This is an old tool, but still useful. I saw someone asking for a tool to grab FTP files from the wire without using something like Wireshark, which brought me to this tool – FTPXerox.
FTPXerox grabs files that are transferred across the network using the FTP protocol. It was written to demonstrate the fact that any “clear-text” file transfer protocol is susceptible to such attacks. It implements a full end-to-end TCP re-assembly engine that watches for FTP transfers. Once the engine detects an FTP file transfer, it grabs the file off the wire and stores it in a local file. It is quite intelligent in the sense, it can reconstruct exact file names and even grab binary files! Version 1.0, however, does NOT support PASV mode file transfers.
Notes
Due to the way the TCP re-assembly engine is implemented, FTPXerox can also give directory listing commands (NLST), (LIST) etc in a file. These files will be of the form “fnXXXXXX”. This is just extra information. We plan to fix that in the next release. If you do not need directory listings, just delete these files as and when they’re formed.
You can download FTPXerox v1.0 here:
Or read more here.
David says
I already know this tool, very effective and do the right job. But thanks for sharing.
Erik says
I also noticed this question on the pen-test mailing list at securityfocus.
In my opinion the best tool for extracting files sent over FTP from a pcap file is NetworkMiner, it supports both normal (PORT) and passive (PASV) FTP transfers. You can also extract files sent with TFTP, HTTP and SMB with this tool.
But you have to be running Windows to use NetworkMiner, or you could go ahead and install Wine (www.winehq.org)
NetworkMiner is available here:
http://networkminer.sourceforge.net/
I think you
Darknet says
Yes we’ve covered NetworkMiner before!
I think Honeysnap is a good option too, will cover that later.