{"id":1843,"date":"2009-06-10T08:28:57","date_gmt":"2009-06-10T08:28:57","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1843"},"modified":"2015-09-09T19:38:03","modified_gmt":"2015-09-09T11:38:03","slug":"ftpxerox-v10-ftp-file-transfer-sniffer","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/06\/ftpxerox-v10-ftp-file-transfer-sniffer\/","title":{"rendered":"FTPXerox v1.0 – FTP File Transfer Sniffer"},"content":{"rendered":"

This is an old tool, but still useful. I saw someone asking for a tool to grab FTP files from the wire without using something like Wireshark<\/a>, which brought me to this tool – FTPXerox.<\/p>\n

FTPXerox grabs files that are transferred across the network using the FTP protocol. It was written to demonstrate the fact that any “clear-text” file transfer protocol is susceptible to such attacks. It implements a full end-to-end TCP re-assembly engine that watches for FTP transfers. Once the engine detects an FTP file transfer, it grabs the file off the wire and stores it in a local file. It is quite intelligent in the sense, it can reconstruct exact file names and even grab binary files! Version 1.0, however, does NOT support PASV mode file transfers.<\/p>\n