What is a directory traversal attack?
▼
Directory traversal (also called path traversal) exploits insufficient input validation to access files outside the intended directory. Attackers use sequences like ../ or ..%2f to navigate up the directory tree and read sensitive files.
Does IIS block directory traversal by default?
▼
IIS Request Filtering blocks basic ../ sequences by default, but attackers use double-encoding, Unicode, and other bypass techniques. You need defense in depth with WAF rules and application-level validation.
What files do attackers target with directory traversal?
▼
Common targets include /etc/passwd (Linux), web.config, .env files, database configuration files, application source code, and any file containing credentials or sensitive configuration.