IIS 403 Directory Traversal Detection

WebServerErrors IIS Directory Traversal

What This Means

Detect directory traversal attacks in IIS logs. Learn to identify path traversal sequences (../) that attempt to access files outside the web root for data exfiltration.

Example Log

2026-03-08 18:12:33 W3SVC1 WEB01 10.0.1.50 GET /images/..%2f..%2f..%2fetc/passwd - 443 - 198.51.100.88 Mozilla/5.0 - 403 0 0 156

Indicators of Suspicious Activity

How to Investigate

  1. Search IIS logs for URL-encoded traversal patterns in cs-uri-stem and cs-uri-query
  2. Decode the URL encoding to reveal the actual paths being targeted
  3. Check if any traversal attempts resulted in 200 responses (successful exploitation)
  4. Identify the target files the attacker is trying to access
  5. Review IIS Request Filtering rules to ensure traversal sequences are blocked
  6. Test your application for path traversal vulnerabilities

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Log Types

Related Attack Patterns

Frequently Asked Questions

What is a directory traversal attack?
Directory traversal (also called path traversal) exploits insufficient input validation to access files outside the intended directory. Attackers use sequences like ../ or ..%2f to navigate up the directory tree and read sensitive files.
Does IIS block directory traversal by default?
IIS Request Filtering blocks basic ../ sequences by default, but attackers use double-encoding, Unicode, and other bypass techniques. You need defense in depth with WAF rules and application-level validation.
What files do attackers target with directory traversal?
Common targets include /etc/passwd (Linux), web.config, .env files, database configuration files, application source code, and any file containing credentials or sensitive configuration.