EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

FTP Commands

By Swati TawdeSwati Tawde

Home » Software Development » Software Development Tutorials » Network Security Tutorial » FTP Commands

FTP Commands

Introduction to FTP Command

FTP stands for File Transfer Protocol. The responsibility of FTP is to transform a file from one location to another. For transforming file, FTP uses TCP services. It uses two TCP connections, i.e. control connection and data connection. Both control connection and data connection use well-known port 21 and well-known port 20, respectively. In this article, we will discuss different FTP Commands.

For communication, a client sends commands to the server, and in return, the server sends a response to the client. Commands that are sent from the client side are in the form ASCII character set.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

FTP Commands

FTP commands can be categorized into the following six groups.

  • Access Commands
  • File management commands
  • Data formatting commands
  • Port defining commands
  • File transferring commands
  • Miscellaneous commands

let’s discuss these commands one by one

1. Access Commands

Users can use these commands to access the remote system.

Below is a list of access commands

  • USER: This command is used to give information about the user.  It takes one argument, i.e. user id.
  • PASS: This command is used to set the user’s password, or using this user can log into the system. It takes one argument, i.e. user password.
  • ACCT: It gives information about the user account. It takes one argument, i.e. account name.
  • QUIT: To log out from the system, this command is used.
  • ABOR:  It aborts the previous command.
  • REIN:  It is used to reinitialize the system.

2. File Management Commands

Users can access the file system present on the remote system using these commands. It allows a user to create a new directory, delete files, navigate throughout the directories, etc

Below is the list of file management commands

  • CWD: This command is used to switch from one directory to another. It takes one argument, i.e. directory name.
  • CDUP: It is used to switch to the parent directory.
  • DELE: It is used to delete the file from the directory. It takes one argument, i.e. file name.
  • LIST:  It will give a list of all files present in the specified directory. It takes one argument, i.e. directory name.
  • NLIST:  It will give a list of files without their attributes present in the specified directory. It takes one argument, i.e. directory name.
  • MKD: This command is used to create a new directory. It takes one argument, i.e. directory name.
  • RMD: This command is used to remove the directory. It takes one argument, i.e. directory name.
  • PWD: It will display the name of the current directory.
  • RNTO: It is used to rename the file. It takes one argument, i.e. a new file name.
  • SMNT: It is used for mounting a file system. It takes one argument, i.e. file system name.
  • RNFR: It is used to identify a file that needs to be renamed. It takes one argument, i.e. Old file name.

3. Data Formatting Commands

for defining data attributes, these commands have been used. It defines data attributes like type of file, the structure of data and the transmission modes.

Popular Course in this category
All in One Software Development Bundle (600+ Courses, 50+ projects)600+ Online Courses | 3000+ Hours | Verifiable Certificates | Lifetime Access
4.6 (3,144 ratings)
Course Price

View Course

Related Courses
CDN Training (2 Courses)OSPF Training Program (2 Courses)Penetration Testing Training Program (2 Courses)
  • TYPE: It defines the type of file. It takes five arguments for defining the file type. A for ASCII, E for EBCDIC, I for an image, N for nonprint and T for telnet.
  • STRU: It defines the organization of data. It takes three arguments. F for file, R for the record, and P for the page.
  • MODE: This command is used to define the transmission mode of the file. It takes three arguments. S for the stream,  B for block and C for compressed.

4. Port Defining Commands

It is used for defining the port number for connection at the client-side. Port number can be assigned using one of the fooling methods

  • The client can choose an ephemeral port number using the PORT command and then send it to the server using passive open. After receiving an ephemeral port number, sever creates an active open.
  • The client uses the PASV command and tells the server to choose any port number. A server makes passive open on that port number and sends that port number to the client. After receiving a port number from a server, the client issues active open for that port number.

Below is the list of port defining commands

  • PORT: This command allows a client to choose a port number. It takes one argument, i.e. six-digit identifier.
  • PASV: This command let the server to choose a port number.

5. File Transfer Commands

For transferring files, these commands are used. These commands take one argument, i.e. file name.

Below is the list of file transfer commands

  • RETR: The client uses this command to retrieve files from the server.
  • STOR: The client uses this command to stores files on the server.
  • APPE: It is similar to the STOR command, but if the file exists, then data must be appended to it.
  • STOU: It is also similar to the STOR command, but every file name should be unique in the directory.
  • ALLO: This command is to allocate storage space for files on the server.
  • STAT: This command will display the status of the specified files.
  • REST:  This command will position the file marker at specified data points.

6. Miscellaneous Commands

These commands are used for delivering information to the FTP user at the client-side.

Below is the list of miscellaneous commands.

  • HELP: This command will display information about the server.
  • NOOP: This command is used to check whether the server is alive or not.
  • SITE: This command will specify the specific commands. It takes one argument, i.e. commands.
  • SYST: This command will display information about the operating system used by the server.

Recommended Articles

This has been a guide to FTP Commands. Here we have discussed the basic concept with a list of the top 6 FTP Commands in detail. You may also look at the following articles to learn more –

  1. PowerShell Commands
  2. Perl Commands
  3. What Is Networking Protocols
  4. Bootstrap Commands

All in One Software Development Bundle (600+ Courses, 50+ projects)

600+ Online Courses

3000+ Hours

Verifiable Certificates

Lifetime Access

Learn More

1 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Vulnerability Assessment Tools
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • Daisy Chain Topology
    • Markov Logic Network
    • Security engineering
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Data Link Layer Services
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - All in One Software Development Bundle (600+ Courses, 50+ projects) Learn More