On Path Traversal, which is an attack that lets an attacker access restricted directories and perform unauthorized file operations, ig4chis3c found a way to go deeper with the Path Traversal attack with a 500−10k worth method.
The crux of the matter is to find vulnerabilities on systems that rely on filing pathways and filenames and do not validate them, allowing the attacker to manipulate the pathway to go deeper into the system and possibly reach the directories he wants.
The attacker can then perform unauthorized operations on the files in these directories, such as uploading or overwriting them.
This new method of path traversal consists of several steps, including mapping crucial endpoints, file uploads and downloads, mobile deep links, and temp files, as well as going deeper and deeper in the system directories to reach the target files.