Companies Home Search Profile

OWASP TOP 10: Directory traversal ~2023

Focused View

Foyzul Islam

1:16:55

137 View
  • 1 - Introduction.html
  • 2 - File path traversal.mp4
    13:24
  • 3 - Traversal sequences blocked.mp4
    10:32
  • 4 - Stripped nonrecursively.mp4
    11:19
  • 5 - Stripped with superfluous URLdecode.mp4
    13:11
  • 6 - Advanced Directory traversal.mp4
    10:49
  • 7 - Null byte bypass.mp4
    07:50
  • 8 - Burp Suite.mp4
    07:08
  • 9 - Its me.mp4
    02:42
  • Description


    Vulnerabilities in Directory Traversal | Learn with Fun way

    What You'll Learn?


    • Access files and Directories that are stored outside the web root folder
    • Accessing sensitive information
    • About The vulnerable code
    • Directory traversal mitigation
    • Access arbitrary files and directories stored on the filesystem

    Who is this for?


  • How Wants to be Bug Bounty Hunter
  • How wants to practice OWASP Top 10
  • How Loves Web Application penetration testing
  • More details


    Description

    A path traversal vulnerability allows an attacker to access files on your web server to which they should not have access. They do this by tricking either the web server or the web application running on it into returning files that exist outside of the web root folder.


    The OWASP Top 10 provides rankings of—and remediation guidance for—the top 10 most critical web application security risks. Leveraging the extensive knowledge and experience of the OWASP's open community contributors, the report is based on a consensus among security experts from around the world.


    What is Directory traversal?

    Directory traversal is a web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application. This might include application code and data, credentials for back-end systems, and sensitive operating system files. In some cases, an attacker might be able to write to arbitrary files on the server, allowing them to modify application data or behavior, and ultimately take full control of the server.

    A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder.

    It is the second most prevalent and impactful vulnerability as per the OWASP “Top 10” list.



    What is the difference between directory traversal and path traversal?

    The main difference between a Directory path traversal and the file inclusion vulnerabilities is the ability to execute the source codes that are not saved in interpretable files (like . php or . asp and others)



    why need to learn Directory traversal vulnerabilities?

    With a system vulnerable to directory traversal, an attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.

    Depending on how the website access is set up, the attacker will execute commands by impersonating himself as the user which is associated with “the website”. Therefore it all depends on what the website user has been given access to in the system


    How to prevent Directory traversal attacks

    • When making calls to the filesystem, you should avoid relying on user input for any part of the path.

    • If you really can’t avoid relying on user input, normalize the information or the path before using it. Then, check that its prefix matches the directory that users are permitted to access.

    • Process URI requests that do not result in a file request

    • Ensure that your web server operating system and critical application files are kept separate from each other

    • Do not use administrator or superuser accounts to run web servers whose permissions only allow them to read only the files it needs to run

    Who this course is for:

    • How Wants to be Bug Bounty Hunter
    • How wants to practice OWASP Top 10
    • How Loves Web Application penetration testing

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Foyzul Islam
    Foyzul Islam
    Instructor's Courses
    My name is Paplu Ahmed, I am an Ethical Hacker, Programmer and CTF Lover. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.Paplu Ahmed is a Penetration Tester with over 4 years of experience in Ethical Hacking and Problem Solving. He started learning hacking and programming on his own from a young age. Now he is working successfully on popular sites like HackerOne, bugCrowed, ctftime, hackerrank, codeforces.As a tutor, he joined Udemy, the world's largest online learning platform, in 2023. He joined as an instructor to spread his experience and skills among the people. Prior to this, he has been teaching offline for more than 1.5 year
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 8
    • duration 1:16:55
    • Release Date 2023/05/17