<Ul> <Li> Brute force attack </Li> <Li> FTP bounce attack </Li> <Li> Packet capture </Li> <Li> Port stealing (guessing the next open port and usurping a legitimate connection) </Li> <Li> Spoofing attack </Li> <Li> Username enumeration </Li> </Ul> <Li> Brute force attack </Li> <Li> FTP bounce attack </Li> <Li> Port stealing (guessing the next open port and usurping a legitimate connection) </Li>

Mode of data transfer in ftp where all the is left to tcp