diff --git a/Portswigger/Directory Traversal/Lab3.md b/Portswigger/Directory Traversal/Lab3.md new file mode 100644 index 0000000..fb43637 --- /dev/null +++ b/Portswigger/Directory Traversal/Lab3.md @@ -0,0 +1,17 @@ +# Portswigger Directory Traversal Lab-3 + +## File path traversal, traversal sequences stripped non-recursively + +In this lab we have to read `/etc/passwd` file through LFI (Local File Inclusion) or Directory Traversal through the vulnerable GET parameter `image` on the web page but this time the web application will be filtering those `../` to prevent us going out of the current directory from where it's loading those images + + + +We have the same web page as we saw from the other 2 labs + + + +On trying those `../` it doesn't give us the `passwd` file so to get around this filter is to use `..././` instead of `../` and the way it's going to work is that the filter will check for `../` and it's going to remove it from the string so all that is left will be . , . / which will be treated as `../` + + + +