Path Traversal sometimes also termed as “Directory Traversal” is an HTTP vulnerability which allows an attacker to trick and manipulate the web application’s URL to access the files or directories that resides outside the application’s root folder. This vulnerability carries when a developer fails to establish or manage the input validations while including the files such as images, static texts, codes, etc. in their web applications.
Here are some directory traversal payloads:
This is just a small information post, I can make a post on how to setup a lab or an environment to practice such techniques and go through how you would perform these.
Here are some directory traversal payloads:
PayloadsAllTheThings/Directory Traversal at master · swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
github.com
This is just a small information post, I can make a post on how to setup a lab or an environment to practice such techniques and go through how you would perform these.