$ dirb http://www.example.com # correct
dirb http://example.com # may produce incomplete results
dirb http://www.example.com # correct
dirb http://example.com # may produce incomplete results
dirb http://www.example.com # correct
dirb http://example.com # may produce incomplete results
# Intended behaviour
GET /loadImage?filename=photo.png # Path traversal attempt
GET /loadImage?filename=../../../etc/passwd
# Intended behaviour
GET /loadImage?filename=photo.png # Path traversal attempt
GET /loadImage?filename=../../../etc/passwd
# Intended behaviour
GET /loadImage?filename=photo.png # Path traversal attempt
GET /loadImage?filename=../../../etc/passwd - Information Gathering — passive and active reconnaissance before any interaction with the target
- Enumeration/Scanning — identifying live services, open ports, application fingerprints
- Exploitation — leveraging identified vulnerabilities using public exploits or logic manipulation
- Privilege Escalation — expanding access horizontally (lateral movement) or vertically (privilege gain)
- Post-Exploitation — assessing further reachable systems, data exfiltration potential, and producing a findings report