Search for Directory Traversal Vulnerabilities :DotDotSlash 2018 - TechnoExploit

Breaking

Post Top Ad

Post Top Ad

Friday, March 2, 2018

Search for Directory Traversal Vulnerabilities :DotDotSlash 2018


                A directory traversal (or path traversal) consists in exploiting insufficient security validation / sanitization of user-supplied input file names, such that characters representing "traverse to parent directory" are passed through to the file APIs.
 
The goal of this attack is to use an affected application to gain unauthorized access to the file system. This attack exploits a lack of security (the software is acting exactly as it is supposed to) as opposed to exploiting a bug in the code.

Directory traversal is also known as the ../ (dot dot slash) attack, directory climbing, and backtracking. Some forms of this attack are also canonicalization attacks.

dotdotslash

A tool to help you search for Directory Traversal Vulnerabilities

Benchmarks

Platforms that I tested to validate tool efficiency:

Installation

You can download the last version cloning this repository
git clone https://github.com/jcesarstef/dotdotslash/
This tool was made to work with Python3

Usage

python3 dotdotslash.py --help

usage: dotdotslash.py [-h] --url URL --string STRING [--cookie COOKIE]

optional arguments:
  -h, --help       show this help message and exit
  --url URL        Url to attack.
  --string STRING  String in --url to attack. Ex: document.pdf
  --cookie COOKIE  Document cookie.

Example

python3 dotdotslash.py \
--url "http://192.168.58.101/bWAPP/directory_traversal_1.php?page=a.txt" \
--string "a.txt" \
--cookie "PHPSESSID=089b49151627773d699c277c769d67cb; security_level=3"
 



Source: http://activeterium.com/B49t


No comments:

Post a Comment

Post Top Ad