A directory traversal (or path traversal) consists in exploiting insufficient security validation / sanitization of user-supplied input file names, such that characters representing "traverse to parent directory" are passed through to the file APIs.
The goal of this attack is to use an affected application to gain unauthorized access to the file system. This attack exploits a lack of security (the software is acting exactly as it is supposed to) as opposed to exploiting a bug in the code.
Directory traversal is also known as the ../ (dot dot slash) attack, directory climbing, and backtracking. Some forms of this attack are also canonicalization attacks.
dotdotslash
A tool to help you search for Directory Traversal VulnerabilitiesBenchmarks
Platforms that I tested to validate tool efficiency:Installation
You can download the last version cloning this repositorygit clone https://github.com/jcesarstef/dotdotslash/This tool was made to work with Python3
Usage
python3 dotdotslash.py --help
usage: dotdotslash.py [-h] --url URL --string STRING [--cookie COOKIE]
optional arguments:
-h, --help show this help message and exit
--url URL Url to attack.
--string STRING String in --url to attack. Ex: document.pdf
--cookie COOKIE Document cookie.
Example
python3 dotdotslash.py \
--url "http://192.168.58.101/bWAPP/directory_traversal_1.php?page=a.txt" \
--string "a.txt" \
--cookie "PHPSESSID=089b49151627773d699c277c769d67cb; security_level=3"
Source: http://activeterium.com/B49t
No comments:
Post a Comment