# nxc ftp > Pentest and exploit FTP servers. > More information: . - Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: `nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` - Continue searching for valid credentials even after valid credentials have been found: `nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --continue-on-success` - Perform directory listings on each FTP server the supplied credentials are valid on: `nxc ftp {{192.168.178.0/24}} -u {{username}} -p {{password}} --ls` - Download the specified file from the target server: `nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --get {{path/to/file}}` - Upload the specified file to the target server at the specified location: `nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}`