iceberg
Diamond Member
- May 15, 2017
- 36,788
- 14,920
- 1,600
Honestly it depends on the attack type, vulnerability found to use and requirements of vulnerability exploitation.Accept the internet is my business and dude without the ftp, you ain’t getting nothingNot without an ftp tool. Which means third party sw. and there would be a footprint .Still a physical machine
There is hardware involved but you could never put your hands on a single virtual machine and carry it to the FBI lab for analysis.
If their running Hyper-V or VMWare, it would be easy to make a portable copy.
Even if they're running a physical server they can run a diskcopy utility to an external hard drive. Easy to do.
If Logging and/or auditing is turned on., all connections would have been logged.
C'mon, stop trying to pretend that you know something about computers. FTP is not needed at all. It's rather outdated anyway. (I still use it for some things, but I'm an old fashion command-line type of guy).
Ftp is for file transfer but I dot know any using it for hacks.