📄️ Lab 1 - Simple Path traversal
A detailed walkthrough of the PortSwigger Lab on simple path traversal vulnerability, demonstrating exploitation using ../ traversal sequences.
📄️ Lab 2 - Absolute Path Bypass
Learn how to exploit a path traversal vulnerability when traversal sequences are blocked, by using an absolute path to access sensitive files like /etc/passwd.
📄️ Lab 3 - Non-Recursive Traversal Bypass
Learn how to bypass non-recursive path traversal filtering using the dot-dot slash trick (....//) to exploit a web application and access sensitive files like /etc/passwd.
📄️ Lab 4 - Double URL Encoding Bypass
Learn how to bypass traversal sequence filtering using double URL encoding to exploit a path traversal vulnerability and access sensitive files like /etc/passwd.
📄️ Lab 5 - Start-of-Path Validation Bypass
Learn how to exploit a path traversal vulnerability by bypassing start-of-path validation using a crafted filename that begins with a base directory path like /var/www/images and escapes using traversal sequences.
📄️ Lab 6 - Null Byte Extension Bypass
Exploit a path traversal vulnerability by injecting a null byte to bypass file extension validation and access restricted files like /etc/passwd.