To examine the vulnerabilities of an FTP file transfer, perform the following activity:
1. Capture network traffic using WireShark or Ethereal
2. Perform a file exchange( anonymous or authenticated) using FTP
3. Stop the traffic capture
4. Search the captured traffic stream for the account and password
5. Summarize your experience