Vulnerability Analysisdirectory traversalfuzzerhttpftptftp

DotDotPwn

DotDotPwn is a flexible intelligent fuzzer designed to discover directory traversal vulnerabilities in software such as HTTP/FTP/TFTP servers and web platforms like CMSs, ERPs, and Blogs.

Description

DotDotPwn is a specialized security tool for identifying directory traversal vulnerabilities, also known as dot-dot-slash attacks. It automates the fuzzing process by generating traversal patterns and testing them against target services to detect potential security flaws that could allow unauthorized access to files outside the intended directory.

Use cases include penetration testing of web servers, FTP servers, TFTP servers, and various web applications such as content management systems (CMSs), enterprise resource planning (ERPs), and blogs. The tool is particularly useful for security researchers and pentesters looking to uncover misconfigurations or vulnerabilities in file access controls.

It supports multiple protocols and provides detailed reporting on traversal attempts, making it an essential component in vulnerability assessment workflows within Kali Linux environments.

How It Works

DotDotPwn operates by creating traversal patterns mixing dots and slashes, multiplying them based on depth (e.g., -d switch for deepness), generating special traversal patterns, translating backslashes in filenames, adapting to detected OS type (windows, unix, or generic), and including special suffixes. The Traversal Engine produces thousands of test patterns (e.g., 19680 tests) which are fuzz-tested against the target at specified rates (e.g., 3.33 traversals per second). It supports modules like http, ftp, tftp, and uses techniques such as OS detection via nmap (-O), service banner grabbing (-s), and custom filenames or extra files.

Installation

bash
sudo apt install dotdotpwn

Flags

-mModule [http | http-url | ftp | tftp | payload | stdout]
-hHostname
-OOperating System detection for intelligent fuzzing (nmap)
-oOperating System type if known ("windows", "unix" or "generic")
-sService version detection (banner grabber)
-dDepth of traversals (e.g. deepness 3 equals to ../../../; default: 6)
-fSpecific filename (e.g. /etc/motd; default: according to OS detected, defaults in TraversalEngine.pm)
-EAdd @Extra_files in TraversalEngine.pm (e.g. web.config, httpd.conf, etc.)
-MHTTP method (e.g. GET)

Examples

Use the HTTP scan module against a host using the GET method
dotdotpwn.pl -m http -h 192.168.1.1 -M GET
Display help and available options for the tool
dotdotpwn -h
Scan HTTP service on target host with default settings
dotdotpwn.pl -m http -h 192.168.1.1
Fuzz FTP service for directory traversal vulnerabilities
dotdotpwn.pl -m ftp -h 192.168.1.1
Test TFTP server for traversal issues
dotdotpwn.pl -m tftp -h 192.168.1.1
Perform HTTP fuzzing with automatic OS detection using nmap
dotdotpwn.pl -m http -h 192.168.1.1 -O
HTTP fuzzing with traversal depth of 3
dotdotpwn.pl -m http -h 192.168.1.1 -d 3
Updated 2026-04-16kali.org ↗