The FTP bounce attack is an example of how a legitimate application can be used for other purposes. In this video, you’ll learn how this legacy attack type works and how it was used to manipulate systems.
<< Previous Video: Packet Sniffing AttacksNext: End-User Security Training and Awareness >>