Overview
TheFileZilla command searches for FileZilla FTP client configuration files on the system. FileZilla stores FTP/SFTP server credentials, including hostnames, usernames, and sometimes passwords in plaintext or weakly encoded formats, making these files valuable targets for credential harvesting.
Important: User commands run for the current user if not elevated and for ALL users if elevated.
Syntax
Output
The command returns:- FileZilla configuration file locations
- Server connection details (hostname, port)
- Stored usernames and passwords
- Recent server list
- Site manager entries
- File transfer history
Use Cases
Red Team
- Credential Harvesting: Extract FTP/SFTP credentials from FileZilla configuration
- Network Mapping: Discover internal and external FTP servers
- Lateral Movement: Use harvested credentials to access FTP servers
- Infrastructure Discovery: Identify file transfer infrastructure and endpoints
- Privilege Escalation: Find credentials that may provide elevated access to systems
Blue Team
- Credential Hygiene: Identify users storing FTP credentials insecurely
- Security Audit: Review FTP server access patterns and credentials
- Incident Response: Quickly identify potentially compromised FTP credentials
- Compliance Checking: Ensure FTP credential storage aligns with policies
- Risk Assessment: Evaluate exposure from plaintext FTP credentials
Example Output
Privilege Context
- Non-Elevated: Searches for FileZilla configuration files for the current user only
- Elevated: Searches for FileZilla configuration files for ALL users on the system, providing comprehensive credential discovery
Remote Execution
This command supports remote execution (marked with + in the command list). Remote syntax:Detection Considerations
Indicators
- File system access to FileZilla configuration directories
- Reading XML configuration files in AppData\Roaming\FileZilla
- Pattern-based searching for FileZilla-specific file names
- Enumeration across multiple user profiles
Defensive Monitoring
- Monitor access to FileZilla configuration directories
- Alert on non-FileZilla processes reading configuration files
- Track automated enumeration of FTP credential files
- Log access to recentservers.xml and sitemanager.xml files
- Detect credential harvesting tools accessing FileZilla data
- Monitor for bulk configuration file enumeration across users
- Alert on exfiltration of FileZilla configuration files
Security Recommendations
- Educate users on secure FTP credential management
- Discourage storing passwords in FileZilla
- Use key-based authentication instead of passwords
- Implement file access monitoring on configuration directories
- Consider alternative FTP clients with better credential protection
- Regularly audit FileZilla installations and configurations
Related Commands
- PuttySessions: Finds saved Putty/SSH credentials
- MTPuTTY: Enumerates MTPuTTY configuration files
- SuperPutty: Finds SuperPutty configuration files
- WindowsCredentialFiles: Searches for Windows credential files
- CredEnum: Enumerates saved credentials using Windows API
- CloudCredentials: Finds cloud provider credential files