diff --git a/Portswigger/Directory Traversal/Lab3.md b/Portswigger/Directory Traversal/Lab3.md
new file mode 100644
index 0000000..fb43637
--- /dev/null
+++ b/Portswigger/Directory Traversal/Lab3.md
@@ -0,0 +1,17 @@
+# Portswigger Directory Traversal Lab-3
+
+## File path traversal, traversal sequences stripped non-recursively
+
+In this lab we have to read `/etc/passwd` file through LFI (Local File Inclusion) or Directory Traversal through the vulnerable GET parameter `image` on the web page but this time the web application will be filtering those `../` to prevent us going out of the current directory from where it's loading those images
+
+
+
+We have the same web page as we saw from the other 2 labs
+
+
+
+On trying those `../` it doesn't give us the `passwd` file so to get around this filter is to use `..././` instead of `../` and the way it's going to work is that the filter will check for `../` and it's going to remove it from the string so all that is left will be . , . / which will be treated as `../`
+
+
+
+