Verify path traversal vulnerability in web server

匆匆过客 提交于 2019-12-04 00:04:06

The curl flag you are looking for is curl --path-as-is .

I'm not aware of a way to do it via curl, but you could always use telnet. Try this command:

telnet www.example.com 80

You'll see:

Trying xxx.xxx.xxx.xxx... Connected to www.example.com. Escape character is '^]'.

You now have an open connection to www.example.com. Now just type in your command to fetch the page:

GET /directory/../ HTTP/1.1

And you should see your result. e.g.

HTTP/1.1 400 Bad Request

You can use an intercepting proxy to capture a request to your application and repeat the request with parameters changed, such as the raw URL that is requested from the application.

The free version of Burp Suite will allow this using the Repeater.

However, there are alternatives that should also allow this such as Zap, WebScarab and Fiddler2.

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!