HACK STEPS (continued)
■
If the application’s behavior is identical in the two cases, then it may be
vulnerable. You should proceed directly to attempting to access a differ-
ent file by traversing above the start directory.
■
Do'stlaringiz bilan baham: