Apr 28 · 16 min read · In Part 1 and Part 2 of this series, we examined directory traversal from a developer's perspective, covering attack vectors, secure coding patterns, Apache Commons IO usage, frontend security conside
Join discussion
Apr 20 · 22 min read · In previous part 1, we discussed the basics of directory traversal attacks, attack vectors, vulnerable code structures, and the essential mitigation techniques, including secure Spring Boot usage. In
Join discussion
Apr 7 · 16 min read · Directory traversal vulnerabilities are at the core of a failure in the boundary between application logic and filesystem access. There is a tendency to focus on SQL injection, but directory traversal
Join discussion
May 24, 2025 · 2 min read · Introduction Today, I'm sharing my hands-on adventure through a real-world lab from PortSwigger's Web Security Academy, where I successfully exploited a Path Traversal vulnerability to read the sensitive /etc/passwd file. If you've ever wondered how ...
Join discussion
May 15, 2025 · 3 min read · Author: Liz Zelda Fallstar (aka ghosthermes)Date: Thursday, May 15, 2025 Introduction: Hacking in the Ruins of the Internet Welcome to the first official chronicle of my bug bounty journey-a tale of exploitation, disclosure, and the slow, beautiful...
Join discussionOct 2, 2024 · 4 min read · Directory Traversal, also known as Path Traversal, is a serious web vulnerability that allows attackers to gain unauthorized access to the server’s filesystem by manipulating input paths. By exploiting this vulnerability, an attacker can access files...
Join discussion
Apr 12, 2023 · 4 min read · Web hacking is a common technique used by attackers to exploit vulnerabilities in web applications. In this article, we will explore some common types of web attacks, including cookie tampering, directory traversal, session hijacking, authentication ...
Join discussion