# path traversal probing type: leaky #debug: true name: crowdsecurity/http-path-traversal-probing description: "Detect path traversal attempt" filter: "evt.Meta.log_type in ['http_access-log', 'http_error-log'] && any(File('http_path_traversal.txt'),{evt.Meta.http_path contains #})" data: - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/master/web/path_traversal.txt dest_file: http_path_traversal.txt type: string groupby: "evt.Meta.source_ip" distinct: "evt.Meta.http_path" capacity: 3 reprocess: true leakspeed: 10s blackhole: 2m labels: remediation: true classification: - attack.T1595.002 behavior: "http:exploit" label: "HTTP Path Traversal Exploit" service: http spoofable: 0 confidence: 3