Home / Cross Site Scripting / Hacking websites using Directory Traversal Attacks

Hacking websites using Directory Traversal Attacks

Hacking websites using Directory Traversal Attacks : Hacking websites, nowadays has became little bit difficult as developers nowadays are also focusing on OWASP(Open web application security project) top 10 vulnerabilities which hackers normally use to hack websites. Today Hackingloops has came with tutorial on Directory Traversal Attacks (part of top 10 vulnerabilities). So friends lets start our tutorial on Hacking websites using Directory traversal attacks.

Directory is basically a folder where web designer stores his website files( this is with respect to server). By directory traversal attack, i simply mean that hacker is able to navigate between the directories and files stored in those directories(say root which contains all config files, htaccess file, ini file and xquery files(all these files are most sensible files for any website, if any of these files security is not handled properly, then Hacker can own website)). In short by using directory traversal attack, hackers main aim is to get access to sensible file that i have mentioned above.
Nowadays attackers also use directory traversal attacks to view arbitrary files on web server like SSL private keys and password files.

Directory traversal is also known as the ../ (dot dot slash) attack, directory climbing, and backtracking.

What does ../ or .. (dot dot slash) mean  ?

The .. instructs the system to go one directory(or simply called folder) up.
For example, we are at this location C:HackingHacking ToolsBugtraq. Now on typing .. , we would reach at C:HackingHacking Tools.
Again on typing .. , we would reach at C:Hacking  and so on.Lets again go at location C:HackingHacking ToolsBugtraq. Now suppose we want to access a file abcfile.txt placed in folder Hacking. Just we need to  type ….abcfile.txt . Typing .. two times would take us two directories up (that is to directory Hacking) where abcfile.txt is stored.
I hope you got dot dot slash concept. Now lets proceed further..

So as of now, we have complete understanding what directory means and what dot dot slash means. Now lets understand clearly what directory traversal attack means.

Directory Traversal attacks is an HTTP(or in simple terms web) exploit or vulnerability which allows attackers or hackers to access restricted directories (most hackers are interested in root directory access ) and execute commands outside of the web server’s root directory. The goal of this attack is  to access sensitive files placed on web server by stepping inside root directory using dot dot slash technique. By exploiting a directory traversal vulnerability, an attacker can access files in directories other than the root directory. This can be harmful, since access to restricted files containing passwords or other private information may compromise the web server.

For example, by typing the following URL:

The attacker or hacker causes sample.php to retrieve the file ../../../../web-config.php and display it in the attacker’s or hackers web browser. As i have already told you the character sequence “../” stands for “one directory up”. So the string “../../../../web-config.php” therefore means “go four directories up, then down into root directory and retrieve the file web-config.php from there”.
The attacker needs to guess how many directories to climb in order to get to the desired directory, but this can be easily done by trial and error.

I have setup a live example on my system to explain this vulnerability to users using tomcat server.
Say i am browsing this page:

Directory Traversal Attacks
Directory Traversal Attacks Screen 1

Now i changed test1/about.jsp with ../product.jsp and press enter:


Directory Traversal Attacks
Directory Traversal Attacks Screen 2

Here is the result of above step, we are able to access product.jsp in root folder because this sample was vulnerable to directory traversal attack.

Directory Traversal Attack Pic 3
Directory Traversal Attack Screen 3


Some web applications scan query string for dangerous characters such as:

  • ..
  • ..
  • ../

to prevent directory traversal attack.
However, the query string is usually URI decoded before use. Therefore these applications are vulnerable to percent encoded directory traversal such as:

  • %2e%2e%2f which translates to ../
  • %2e%2e/ which translates to ../
  • ..%2f which translates to ../
  • %2e%2e%5c which translates to ..

Also in windows internet explorer Microsoft added Unicode characters support, which introduced a new way of encoding ../ ,causing their attempts at directory traversal prevention to be bypassed.
Multiple percent encoding, such as

  • %c1%1c
  • %c0%af

are translated into / or characters.
As a good Ethical Hacker, we must know how to protect these loopholes while designing or securing a new website or existing website. So i will also explain the protective measures on how to protect our website from directory traversal attacks. But for that you all need to wait for my next article :P.

I hope you all have enjoyed the article. If you have any queries, questions or didn’t understand anything, feel free to contact me by comments below.

If you like this article then please comment and if you think something is missing and need to be added, feel free to suggest. Thanks for reading!

About Lokesh Singh

Hello Friends, i am Lokesh Singh, certified Ethical hacker ( CEH, SSA, CSIF , CISSP). Have 8+ years of extensive experience in Ethical Hacking, Cyber Security and Penetration Testing domain.

One comment

  1. could you please write another post about IIS Unicode Directory Traversal and Barracuda Local Directory Traversal.
    Many thanks

Have any Suggestions? Compliments? Why not comment then?