BOOK THIS SPACE FOR AD
ARTICLE ADLink of the lab: https://0a9600d403b1d93f83ef6ffa000200c3.web-security-academy.net/
Turn on the foxy proxy or chromium. And go the HTTP history and you will see different requests. And you will find different filenames and choose any one of the filenames and right click and send it to the repeater.
And in the repeater, you will see the following request.
And in the payload add ../../../etc/passwd%0014.jpg. You might be thinking why did i add %00 because it says null byte bypass. And null byte in programming is referred as %00 and \0 and it also says file extension so i add ../../../etc/passwd%0014.jpg. You could add any file such as 19.jpg or anything if its shown in HTTP history.
So this is the response that we get and the lab is solved……..
Congragulations…………………..