MR. Robot Walkthrough
- Strider Gearhead
- Feb 27, 2023
- 1 min read
MR. Robot is a vulnerable machine which is available on tryhackme and it is based on a linux machine and it this machine is inspired by the famous web series Mr. Robot.

So let’s start with our very first step,
We will get the ip address and then we will run the Nmap scan.
Command: nmap -T5 -p- -A <target ip>
Result of nmap:

As we can see port 80 is open, and a webpage is running:

We can do directory fuzzing with the tool using ffuf.
Command: ffuf -w<path/to/wordlist>/FUZZ -u http://<target ip>:FUZZ

Result of ffuf:

Here we got many directories but the most interesting are robots and wp-login.
Let’s check robot directory first.

Here we got this, these are also directories,
Let’s get both of them:
<target ip>/fsocity.dic
<target ip>/key-1-of-3.txt
So the fsocity seems like a dictionary file and key is the flag.
We got our first flag:

Fsocity.dic file is containing passwords, we saw another directory named as wp-login.
Let’s see what’s there.

Comments