top of page
Search

MR. Robot Walkthrough

  • Writer: Strider Gearhead
    Strider Gearhead
  • Feb 27, 2023
  • 1 min read

MR. Robot is a vulnerable machine which is available on tryhackme and it is based on a linux machine and it this machine is inspired by the famous web series Mr. Robot.

ree

So let’s start with our very first step,

We will get the ip address and then we will run the Nmap scan.

Command: nmap -T5 -p- -A <target ip>
Result of nmap:
ree

As we can see port 80 is open, and a webpage is running:

ree

We can do directory fuzzing with the tool using ffuf.

Command: ffuf -w<path/to/wordlist>/FUZZ -u http://<target ip>:FUZZ
ree

Result of ffuf:

ree

Here we got many directories but the most interesting are robots and wp-login.

Let’s check robot directory first.

ree

Here we got this, these are also directories,

Let’s get both of them:

<target ip>/fsocity.dic
<target ip>/key-1-of-3.txt

So the fsocity seems like a dictionary file and key is the flag.

We got our first flag:

ree

Fsocity.dic file is containing passwords, we saw another directory named as wp-login.

Let’s see what’s there.

ree


 
 
 

Comments


bottom of page