Introduction
In this lab, you will learn how to customize the FTP port number on a target system and then use Hydra to perform a brute-force attack against the FTP service on that custom port. This is a valuable skill for penetration testers and security professionals who need to assess the security of systems that have been configured with non-standard FTP ports.
The lab involves configuring the FTP server on the LabEx VM to listen on a non-standard port by modifying the vsftpd.conf file and restarting the FTP service. You'll then use the netstat command to verify that the FTP server is listening on the new port. Finally, you'll use Hydra with the -s option to specify the custom port and execute an FTP attack, validating that Hydra can successfully connect to the FTP service on the configured port.






