🍩
HackBook.io
  • Pentesting Pocket Book for hackers and developers.
  • Reconnaissance
    • Internal Recon Basics
    • OSINT
      • Infrastructure
      • Recon-ng
      • Users
      • Google Dorks
    • Active Scanning
      • NMAP
        • NSE
          • reconnoitre
        • NMap Evasion
      • NC Scan
      • Finger Printing
    • Web Server OSINT
      • WhatWeb
      • Subdomains
      • Directory & File Enumeration
        • Enumeration
          • GoCutty
          • gobuster
          • Dirb
          • nikto
        • Fuzzing
        • Crawling
  • Web Application Hacking
    • Web 101
      • Clients
      • Servers
      • Encodings
    • Web Hacking Techniques
      • SOP
      • Open Redirect
      • File & Resource Attacks
        • Directory Traversal
          • Dir Traversal Fuzzer
        • LFI
        • RFI
        • Unrestricted File Uploads
      • XSS
        • DOM
        • Stored
        • Reflected
        • Blind
        • Self XSS
      • XXE
        • XXE Payloads
      • XPath
      • SSRF
      • CSRF
      • SQLi
        • SQL Basics
        • Securing SQL
        • Hacking SQL
          • sqlmap
          • In-Band
          • Error Based
          • Blind
      • Authorization
      • Session Hijacking
      • Command Injection
      • Insecure Deserialization
      • File Uploads
        • File Upload Mitigations
      • HPP
      • Click Jacking
        • Adobe SWF Investigator
      • HTTP Response Splitting
      • Flash 101
        • Flash Hacking
      • HTML5
        • WebSockets
        • CORS
          • iframe
          • Headers
    • Web Hacking Procedures
      • Captcha
      • Username Generation
      • Username Enumeration
      • Inhouse WebApps
      • SSL Cert Generation
      • CMS
        • WordPress
        • Joomla
      • Popular Exploits
        • Bludit CMS
        • ShellShock
        • WebDav
  • Weaponization
    • Buffer Overflows (BOF)
      • DSBOFG
        • Scripts
  • Initial Access
    • 😈Services
      • Finger
      • SNMP
      • LDAP
      • SMTP
      • NFS
      • RPC
        • RPCBind
      • RDP
      • SQL
        • NoSQL
      • POP3
      • Samba
      • SMB
      • SSH
      • Telnet
      • NetBios
      • VOIP/SIP
      • DNS
        • DNS Lookups
        • Zone Transfer
        • SubDomain Enums
        • dnsdumpster
    • 😈Shells
      • Powercat
      • Odd Shells
      • Troubleshoot
      • TTY/PTTY
  • Persistence
    • File Transfers
      • Py->Exe->Txt
      • Cross compile example
    • Backdoors
  • Privilege Escalation
    • Universal Escalation
    • Windows Escalation
      • Automated
      • Popular Exploits
        • ActiveXObject to Wscript RCE
        • Macros
        • Object Linking
    • Linux Escalation
      • Automated
    • Passwords
      • John
      • Medusa
      • Cewl
      • ncrack
      • Crunch
      • Hydra
      • MITM
      • Responder
        • SAM
          • pwdump and fgdump
          • Pass-the-hash
      • Crack the hash
      • NTLM
  • Network Discovery
    • Network Traffic
      • tcpdump
    • Internal Discovery
  • Collection and Staging
    • Collection
      • File types
  • Hacking Objectives
    • Non Kinetic War (Quick Guide)
  • Procedures
    • Bash Guide
    • Active Directory
    • Crypto 101
    • Forensics
  • Glossary
  • Hacking Frameworks
    • Metasploit
      • msfvenom
    • Dsnif
  • ThreatModeling
    • Threat Modeling Overview
  • Certifications
    • VMDR
      • Qualys Asset Management
      • Qualys Vulnerability Management
      • Qualys Threat Prioritization
      • Qualys Response (Patch Deployment)
    • OSCP Cheat Sheet
  • RF - Radio Frequency
    • Ham Technician
Powered by GitBook
On this page
  • Traversal Files:
  • Sample Output:
  • Files created by the script:

Was this helpful?

  1. Web Application Hacking
  2. Web Hacking Techniques
  3. File & Resource Attacks
  4. Directory Traversal

Dir Traversal Fuzzer

This script is used to enumerate a directory traversal vulnerability when found. Just chmod and run the script then supply it the URL where the traversal was found. Then it will organize the found files into an html doc for quick reading of the output.

Make sure to edit the script on line 14 to point to the wordlist you want to use.

#!/bin/bash
#Created by Prescott Rowe
echo "-------DirTraverseFuzzer-----"
echo "If you have found a web traversal vuln then you can use this script to fuzz it"
echo "Your files will be in the TravFuzz folder and can all be viewed with trav.html. Also make sure to edit the gobuster command on line 12."
echo "Enter your target URL/IP:"

read scan
echo "--Scanning--"
rm -r TravFuzz/ 2>/dev/null
mkdir TravFuzz
mkdir TravFuzz/pngs

gobuster dir -t 30 -w /usr/share/seclists/Fuzzing/lin-traversal.txt -u $scan -e --wildcard -l >> ./TravFuzz/found.txt;
i=0
echo "<HTML><BODY><BR>" > ./TravFuzz/trav.html
for url in $(cat ./TravFuzz/found.txt |grep "Status: 200\|Status: 204\|Status: 301\|Status: 302\|Status: 307\|Status: 403" |grep -v "Size: 0" |cut -d" " -f1);do
	((i++))
	cutycapt --url=$url --out=./TravFuzz/pngs/$i.png
	echo "<b>"$url":</b> <BR><IMG SRC=\""./pngs/""$i"".png"\" width=600 border="6"><BR><BR><BR>" >> ./TravFuzz/trav.html
done
echo "</BODY></HTML>" >> ./TravFuzz/trav.html
echo "--Finished--" 
echo "Check ./TravFuzz/trav.html"

Traversal Files:

These are just the ones I use. Feel free to use your own.

C:/Users/Administrator/NTUser.dat
C:/Documents and Settings/Administrator/NTUser.dat
C:/apache/logs/access.log
C:/apache/logs/error.log
C:/apache/php/php.ini
C:/boot.ini
C:/inetpub/wwwroot/global.asa
C:/MySQL/data/hostname.err
C:/MySQL/data/mysql.err
C:/MySQL/data/mysql.log
C:/MySQL/my.cnf
C:/MySQL/my.ini
C:/php4/php.ini
C:/php5/php.ini
C:/php/php.ini
C:/Program Files/Apache Group/Apache2/conf/httpd.conf
C:/Program Files/Apache Group/Apache/conf/httpd.conf
C:/Program Files/Apache Group/Apache/logs/access.log
C:/Program Files/Apache Group/Apache/logs/error.log
C:/Program Files/FileZilla Server/FileZilla Server.xml
C:/Program Files/MySQL/data/hostname.err
C:/Program Files/MySQL/data/mysql-bin.log
C:/Program Files/MySQL/data/mysql.err
C:/Program Files/MySQL/data/mysql.log
C:/Program Files/MySQL/my.ini
C:/Program Files/MySQL/my.cnf
C:/Program Files/MySQL/MySQL Server 5.0/data/hostname.err
C:/Program Files/MySQL/MySQL Server 5.0/data/mysql-bin.log
C:/Program Files/MySQL/MySQL Server 5.0/data/mysql.err
C:/Program Files/MySQL/MySQL Server 5.0/data/mysql.log
C:/Program Files/MySQL/MySQL Server 5.0/my.cnf
C:/Program Files/MySQL/MySQL Server 5.0/my.ini
C:/Program Files (x86)/Apache Group/Apache2/conf/httpd.conf
C:/Program Files (x86)/Apache Group/Apache/conf/httpd.conf
C:/Program Files (x86)/Apache Group/Apache/conf/access.log
C:/Program Files (x86)/Apache Group/Apache/conf/error.log
C:/Program Files (x86)/FileZilla Server/FileZilla Server.xml
C:/Program Files (x86)/xampp/apache/conf/httpd.conf
C:/WINDOWS/php.ini
C:/WINDOWS/Repair/SAM
C:/Windows/repair/system
C:/Windows/repair/software
C:/Windows/repair/security
C:/WINDOWS/System32/drivers/etc/hosts
C:/Windows/win.ini 
C:/WINNT/php.ini
C:/WINNT/win.ini
C:/xampp/apache/bin/php.ini
C:/xampp/apache/logs/access.log 
C:/xampp/apache/logs/error.log 
C:/Windows/Panther/Unattend/Unattended.xml 
C:/Windows/Panther/Unattended.xml 
C:/Windows/debug/NetSetup.log 
C:/Windows/system32/config/AppEvent.Evt 
C:/Windows/system32/config/SecEvent.Evt 
C:/Windows/system32/config/default.sav 
C:/Windows/system32/config/security.sav 
C:/Windows/system32/config/software.sav 
C:/Windows/system32/config/system.sav 
C:/Windows/system32/config/regback/default 
C:/Windows/system32/config/regback/sam 
C:/Windows/system32/config/regback/security 
C:/Windows/system32/config/regback/system 
C:/Windows/system32/config/regback/software
C:/Program Files/MySQL/MySQL Server 5.1/my.ini 
C:/Windows/System32/inetsrv/config/schema/ASPNET_schema.xml 
C:/Windows/System32/inetsrv/config/applicationHost.config 
C:/inetpub/logs/LogFiles/W3SVC1/u_ex[YYMMDD].log

etc/passwd
etc/shadow
etc/aliases
etc/anacrontab
etc/apache2/apache2.conf
etc/apache2/httpd.conf
etc/at.allow
etc/at.deny
etc/bashrc
etc/bootptab
etc/chrootUsers
etc/chttp.conf
etc/cron.allow
etc/cron.deny
etc/crontab
etc/cups/cupsd.conf
etc/exports
etc/fstab
etc/ftpaccess
etc/ftpchroot
etc/ftphosts
etc/groups
etc/grub.conf
etc/hosts
etc/hosts.allow
etc/hosts.deny
etc/httpd/access.conf
etc/httpd/conf/httpd.conf
etc/httpd/httpd.conf
etc/httpd/logs/access_log
etc/httpd/logs/access.log
etc/httpd/logs/error_log
etc/httpd/logs/error.log
etc/httpd/php.ini
etc/httpd/srm.conf
etc/inetd.conf
etc/inittab
etc/issue
etc/lighttpd.conf
etc/lilo.conf
etc/logrotate.d/ftp
etc/logrotate.d/proftpd
etc/logrotate.d/vsftpd.log
etc/lsb-release
etc/motd
etc/modules.conf
etc/motd
etc/mtab
etc/my.cnf
etc/my.conf
etc/mysql/my.cnf
etc/network/interfaces
etc/networks
etc/npasswd
etc/passwd
etc/php4.4/fcgi/php.ini
etc/php4/apache2/php.ini
etc/php4/apache/php.ini
etc/php4/cgi/php.ini
etc/php4/apache2/php.ini
etc/php5/apache2/php.ini
etc/php5/apache/php.ini
etc/php/apache2/php.ini
etc/php/apache/php.ini
etc/php/cgi/php.ini
etc/php.ini
etc/php/php4/php.ini
etc/php/php.ini
etc/printcap
etc/profile
etc/proftp.conf
etc/proftpd/proftpd.conf
etc/pure-ftpd.conf
etc/pureftpd.passwd
etc/pureftpd.pdb
etc/pure-ftpd/pure-ftpd.conf
etc/pure-ftpd/pure-ftpd.pdb
etc/pure-ftpd/putreftpd.pdb
etc/redhat-release
etc/resolv.conf
etc/samba/smb.conf
etc/snmpd.conf
etc/ssh/ssh_config
etc/ssh/sshd_config
etc/ssh/ssh_host_dsa_key
etc/ssh/ssh_host_dsa_key.pub
etc/ssh/ssh_host_key
etc/ssh/ssh_host_key.pub
etc/sysconfig/network
etc/syslog.conf
etc/termcap
etc/vhcs2/proftpd/proftpd.conf
etc/vsftpd.chroot_list
etc/vsftpd.conf
etc/vsftpd/vsftpd.conf
etc/wu-ftpd/ftpaccess
etc/wu-ftpd/ftphosts
etc/wu-ftpd/ftpusers
logs/pure-ftpd.log
logs/security_debug_log
logs/security_log
opt/lampp/etc/httpd.conf
opt/xampp/etc/php.ini
proc/cpuinfo
proc/filesystems
proc/interrupts
proc/ioports
proc/meminfo
proc/modules
proc/mounts
proc/stat
proc/swaps
proc/version
proc/self/net/arp
root/anaconda-ks.cfg
usr/etc/pure-ftpd.conf
usr/lib/php.ini
usr/lib/php/php.ini
usr/local/apache/conf/modsec.conf
usr/local/apache/conf/php.ini
usr/local/apache/log
usr/local/apache/logs
usr/local/apache/logs/access_log
usr/local/apache/logs/access.log
usr/local/apache/audit_log
usr/local/apache/error_log
usr/local/apache/error.log
usr/local/cpanel/logs
usr/local/cpanel/logs/access_log
usr/local/cpanel/logs/error_log
usr/local/cpanel/logs/license_log
usr/local/cpanel/logs/login_log
usr/local/cpanel/logs/stats_log
usr/local/etc/httpd/logs/access_log
usr/local/etc/httpd/logs/error_log
usr/local/etc/php.ini
usr/local/etc/pure-ftpd.conf
usr/local/etc/pureftpd.pdb
usr/local/lib/php.ini
usr/local/php4/httpd.conf
usr/local/php4/httpd.conf.php
usr/local/php4/lib/php.ini
usr/local/php5/httpd.conf
usr/local/php5/httpd.conf.php
usr/local/php5/lib/php.ini
usr/local/php/httpd.conf
usr/local/php/httpd.conf.ini
usr/local/php/lib/php.ini
usr/local/pureftpd/etc/pure-ftpd.conf
usr/local/pureftpd/etc/pureftpd.pdn
usr/local/pureftpd/sbin/pure-config.pl
usr/local/www/logs/httpd_log
usr/local/Zend/etc/php.ini
usr/sbin/pure-config.pl
var/adm/log/xferlog
var/apache2/config.inc
var/apache/logs/access_log
var/apache/logs/error_log
var/cpanel/cpanel.config
var/lib/mysql/my.cnf
var/lib/mysql/mysql/user.MYD
var/local/www/conf/php.ini
var/log/apache2/access_log
var/log/apache2/access.log
var/log/apache2/error_log
var/log/apache2/error.log
var/log/apache/access_log
var/log/apache/access.log
var/log/apache/error_log
var/log/apache/error.log
var/log/apache-ssl/access.log
var/log/apache-ssl/error.log
var/log/auth.log
var/log/boot
var/htmp
var/log/chttp.log
var/log/cups/error.log
var/log/daemon.log
var/log/debug
var/log/dmesg
var/log/dpkg.log
var/log/exim_mainlog
var/log/exim/mainlog
var/log/exim_paniclog
var/log/exim.paniclog
var/log/exim_rejectlog
var/log/exim/rejectlog
var/log/faillog
var/log/ftplog
var/log/ftp-proxy
var/log/ftp-proxy/ftp-proxy.log
var/log/httpd/access_log
var/log/httpd/access.log
var/log/httpd/error_log
var/log/httpd/error.log
var/log/httpsd/ssl.access_log
var/log/httpsd/ssl_log
var/log/kern.log
var/log/lastlog
var/log/lighttpd/access.log
var/log/lighttpd/error.log
var/log/lighttpd/lighttpd.access.log
var/log/lighttpd/lighttpd.error.log
var/log/mail.info
var/log/mail.log
var/log/maillog
var/log/mail.warn
var/log/message
var/log/messages
var/log/mysqlderror.log
var/log/mysql.log
var/log/mysql/mysql-bin.log
var/log/mysql/mysql.log
var/log/mysql/mysql-slow.log
var/log/proftpd
var/log/pureftpd.log
var/log/pure-ftpd/pure-ftpd.log
var/log/secure
var/log/vsftpd.log
var/log/wtmp
var/log/xferlog
var/log/yum.log
var/mysql.log
var/run/utmp
var/spool/cron/crontabs/root
var/webmin/miniserv.log
var/www/log/access_log
var/www/log/error_log
var/www/logs/access_log
var/www/logs/error_log
var/www/logs/access.log
var/www/logs/error.log
~/.atfp_history
~/.bash_history
~/.bash_logout
~/.bash_profile
~/.bashrc
~/.gtkrc
~/.login
~/.logout
~/.mysql_history
~/.nano_history
~/.php_history
~/.profile
~/.ssh/authorized_keys
~/.ssh/id_dsa
~/.ssh/id_dsa.pub
~/.ssh/id_rsa
~/.ssh/id_rsa.pub
~/.ssh/identity
~/.ssh/identity.pub
~/.viminfo
~/.wm_style
~/.Xdefaults
~/.xinitrc
~/.Xresources
~/.xsession

Sample Output:

Files created by the script:

  A{travFuzz.sh}
  B[TravFuzz folder] --> C((trav.html))
  B --> D((found.txt))
  B --> E(png folder)

trav.html: holds results

found.txt: holds urls that had hits

png folder: Used as reference for the html file

PreviousDirectory TraversalNextLFI

Last updated 3 years ago

Was this helpful?

GitHub - danielmiessler/SecLists: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.GitHub
Logo