# File path traversal Lab4 一樣先進入網站並攔截。   發現在讀取網頁的時候,網頁中的檔案都會被存放在特定的路徑,所以我們丟到 Repeater 中更改路徑,而本題是考驗雙重 URL 編碼,%252f 是雙重編碼的 /,因此: - 第一次編碼:/ → %2f - 第二次編碼:%2f → %252f 伺服器先過濾 %2f(發現有問題),但沒有檢查 %252f,等它解碼完才發現你已經成功走到上層目錄了:../../../etc/passwd  ### File path traversal Lab5 -> [write up](https://hackmd.io/@mio0813/BJSoAN4Qel) ---
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up