P4n1cThreads
Ctrlk
  • 🏴‍☠️Welcome!
    • 🔮Prelude
    • 📚Bookmarks
    • 🚨Licence and Disclaimer
  • Stepping Stone
    • The Linux Command Line
    • 🌐Network Protocols
    • Network Analysis
    • 💾Regex
    • OPSEC
    • Shells/TTYs
    • Wordlists
    • Code
    • Steganography
    • Databases
    • Metasploit
  • Web Exploitation
    • Web Reconnaissance
    • Servers & Proxies
    • Web APIs
    • Java-based web application
    • Web Services/Frameworks
    • Vulnerabilities
      • Broken Access Control and Application Logic Errors
        • Path Traversal
        • LFI
        • IDOR
        • Email Verification Bypass
      • Client-Side Attacks
      • Server-Side Attacks
      • Session Hijacking
      • Template Manipulation
    • Password Spray
  • Cloud Exploitation
    • Kubernetes
    • AWS
  • Linux Exploitation
    • Defense Evasion
    • Confirming and Verifying RCE
    • Static Binaries
    • Enumeration
    • File Transfer
    • Credential Dumping
    • Lateral Movement
    • Persistence
    • Linux Privilege Escalation
    • Docker
  • WINDOWS EXPLOITATION
    • Windows Enumeration
  • Wireless Exploitation
    • NFC
  • Android Exploitation
    • Android Debug Bridge
    • Create Malicious Applications
  • Reverse Engineering
    • Binaries
    • GDB
    • radare2
  • Cryptanalysis
    • Cryptosystems
    • Investigation Methodology
    • Chinese Remainder Theorem Applications
    • Pollard's Rho
    • RSA Attacks
Powered by GitBook
On this page
Edit
  1. Web Exploitation
  2. Vulnerabilities
  3. Broken Access Control and Application Logic Errors

Path Traversal

PreviousBroken Access Control and Application Logic ErrorsNextLFI