Directory traversal on *.aol.com [2](db password leaked)
详细说明:
Directory traversal:
With file protocol(file:///) we can read local files, more than 800 employee's usernames can be downloaded, which can be used to brute SMTP, VPN and other services. I use these usernames to fuzz .bash_history accessibility with Burp Suite.
Finally, I found file:///home/dpadmin/.bash_history. db password:
@xsser show 英文我也会 http://www.wooyun.org/bugs/wooyun-2015-098933/trace/47b1558ac49ca7e30e3a99ca299a086dhttp://www.wooyun.org/bugs/wooyun-2015-098931/trace/75cf011679c058d300bfcc23939a3c96http://www.wooyun.org/bugs/wooyun-2015-098925/trace/8538195123c40099747efdce34fb32d9求审核