View Issue Details

IDProjectCategoryView StatusLast Update
0000567Kali LinuxKali Package Bugpublic2025-07-14 09:18
Reporterd0rm0us3 Assigned Tomuts  
PrioritynormalSeveritytweakReproducibilityalways
Status closedResolutionno change required 
PlatformESXi 64bitOSLinux kali 3.7-trunk-amd64 #1 SMOS Version1.0
Product Version1.0.4 
Summary0000567: pathing issues with last dist-upgrade
Description

root@kali:~# dotdotpwn
-bash: dotdotpwn: command not found
root@kali:~# /usr/share/dotdotpwn/dotdotpwn.pl
Can't locate DotDotPwn/TraversalEngine.pm in @INC (@INC contains: . /etc/perl /usr/local/lib/perl/5.14.2 /usr/local/share/perl/5.14.2 /usr/lib/perl5 /usr/share/perl5 /usr/lib/perl/5.14 /usr/share/perl/5.14 /usr/local/lib/site_perl) at /usr/share/dotdotpwn/dotdotpwn.pl line 56

Steps To Reproduce

simply try to start dotdotpwn.pl

Additional Information

perl packages required aren't included with the latest update.

Activities

rhertzog

rhertzog

2013-09-05 21:08

administrator   ~0000829

The package contains /usr/sbin/dotdotpwn.pl that you are expected to execute. I believe that it would work when you do that.

But it would be way cleaner to install the perl modules in /usr/share/perl5 and install the script directly in /usr/bin/dotdotpwn. Hence I'm leaving this bug open for now.

muts

muts

2013-09-09 11:33

reporter   ~0000837

Last edited: 2013-09-09 11:34

This is not a bug. Run dotdotpwn from the path:

root@kali:~# pwd
/root
root@kali:~# dotdotpwn.pl
#################################################################################

CubilFelino Chatsubo

Security Research Lab and [(in)Security Dark] Labs

chr1x.sectester.net chatsubo-labs.blogspot.com

pr0udly present:

____ __ ____

__ \ __ / |_ \ / |_____ _ ____

| | \ / _ \ | | \ / _ \ _| /\ \/ \/ // \

| \( <_> )| | | ( <_> )| | | | \ /| | \

/_ / _/ || / / _/ || |____| \/\/ |___| /

\/ \/ \/

- DotDotPwn v3.0 -

The Directory Traversal Fuzzer

http://dotdotpwn.sectester.net

[email protected]

by chr1x & nitr0us

#################################################################################

Usage: ./dotdotpwn.pl -m <module> -h <host> [OPTIONS]
Available options:
-m Module [http | http-url | ftp | tftp | payload | stdout]
-h Hostname
-O Operating System detection for intelligent fuzzing (nmap)
-o Operating System type if known ("windows", "unix" or "generic")
-s Service version detection (banner grabber)
-d Depth of traversals (e.g. deepness 3 equals to ../../../; default: 6)
-f Specific filename (e.g. /etc/motd; default: according to OS detected, defaults in TraversalEngine.pm)
-E Add @Extra_files in TraversalEngine.pm (e.g. web.config, httpd.conf, etc.)
-S Use SSL - for HTTP and Payload module (use https:// for in url for http-uri)
-u URL with the part to be fuzzed marked as TRAVERSAL (e.g. http://foo:8080/id.php?x=TRAVERSAL&y=31337)
-k Text pattern to match in the response (http-url & payload modules - e.g. "root:" if trying /etc/passwd)
-p Filename with the payload to be sent and the part to be fuzzed marked with the TRAVERSAL keyword
-x Port to connect (default: HTTP=80; FTP=21; TFTP=69)
-t Time in milliseconds between each test (default: 300 (.3 second))
-X Use the Bisection Algorithm to detect the exact deepness once a vulnerability has been found
-e File extension appended at the end of each fuzz string (e.g. ".php", ".jpg", ".inc")
-U Username (default: 'anonymous')
-P Password (default: '[email protected]')
-M HTTP Method to use when using the 'http' module [GET | POST | HEAD | COPY | MOVE] (default: GET)
-r Report filename (default: 'HOST_MM-DD-YYYY_HOUR-MIN.txt')
-b Break after the first vulnerability is found
-q Quiet mode (doesn't print each attempt)
-C Continue if no data was received from host
root@kali:~#

Issue History

Date Modified Username Field Change
2013-09-05 14:24 d0rm0us3 New Issue
2013-09-05 21:08 rhertzog Note Added: 0000829
2013-09-05 21:09 rhertzog Priority high => low
2013-09-05 21:09 rhertzog Status new => acknowledged
2013-09-09 11:33 muts Note Added: 0000837
2013-09-09 11:33 muts Status acknowledged => closed
2013-09-09 11:33 muts Assigned To => muts
2013-09-09 11:33 muts Resolution open => no change required
2013-09-09 11:34 muts Note Edited: 0000837
2025-07-14 09:18 g0tmi1k Priority low => normal