Code Snippet:
$file = $_GET['file'];
require_once("/var/www/images/$file.dat");
Exploitation:
Normal Mode: http://www.example.host/user.php?file=myprofile.dat Attacking Mode: http://www.example.host/user.php?file=../../../etc/passwd%00What I'm trying to get only NULL byte injection. Again forget about path traversal & pt+LDAP.just focus about "null byte injection.Can anyone give me the guideline that how ZAP will find the "null byte injection" because in my webapp it didn't catch.Above PHP code is in my webapp.Thanks in Advance.
I guess your example is ripped directly from http://projects.webappsec.org/w/page/13246949/Null%20Byte%20Injection
It should be fairly simple to script a PoC.
https://github.com/zaproxy/community-scripts/tree/master/active
Thanks for your genius replay.