<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Lfi on s4yhii&#39;s blog</title>
    <link>https://blog.s4yhii.com/tags/lfi/</link>
    <description>Recent content in Lfi on s4yhii&#39;s blog</description>
    <image>
      <title>s4yhii&#39;s blog</title>
      <url>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.155.3</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 10 May 2022 12:00:00 -0400</lastBuildDate>
    <atom:link href="https://blog.s4yhii.com/tags/lfi/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Directory Traversal Labs</title>
      <link>https://blog.s4yhii.com/posts/2022-05-10-directory-path-traversal/</link>
      <pubDate>Tue, 10 May 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-05-10-directory-path-traversal/</guid>
      <description>&lt;p&gt;Also known as file path traversal allows to read arbitrary files on the servers. in some cases an attacker might be able to write arbitrary files on the server, allowing them to modify application data or behavior.&lt;/p&gt;
&lt;h1 id=&#34;reading-arbitrary-files-via-directory-traversal&#34;&gt;Reading arbitrary files via directory traversal&lt;/h1&gt;
&lt;p&gt;We can use the &lt;code&gt;..&lt;/code&gt; characters to access the parent directory, the following strings are several encoding that can help you bypass a poorly implemented filter.&lt;/p&gt;
&lt;p&gt;For example the url takes a filename parameter and returns the content of the file, the aplicaciones appends the requested filename to this base directort and uses an API to read the contents, so the application implements no defenses against directory traversal attacks,so an attacker can request the following URL to retrieve an arbitrary file from the server&amp;rsquo;s filesystem:&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
