TryHackMe Mr Robot Official Walkthrough

TryHackMe Mr Robot Official Walkthrough

DarkSec

3 года назад

195,581 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Rang3r Kleingeld
Rang3r Kleingeld - 07.11.2023 16:56

how did you find out the username was Elliot

Ответить
Charalampos Spanias
Charalampos Spanias - 27.09.2023 10:58

Great walkthrough, thanks for taking the time to record this!

I would also love if you had included some alternative ways, e.g. Burp's Intruder for bruteforcing the /wp-login dir, using wpscan(?) since it is a WP blog, etc.

Anyway, learned a lot from it, thanks again!

Ответить
Kevin Turbot
Kevin Turbot - 19.09.2023 00:09

Thank you for the video, you're a master at it. Quick question, how do you get the bar at the bottom of your shell. Thank you so much for your answer and a big thank you for this video. 👍

Ответить
Forgiven
Forgiven - 24.07.2023 10:40

Thank you for this amazing walkthrough, I have learned a lot! I have a question, how do you know what directory "archive.php" is stored in? I also noticed that my password is in capital letters, but since Linux is "case-sensitive" the password won't work. Can someone tell me why my output is "case-sensitive" within john the ripper?

Ответить
Mateo Rosser Castro
Mateo Rosser Castro - 17.06.2023 00:05

I loved the video! Mr. Robot is the best! bty, does anyone know who to brute force login forms that are pop ups???

Ответить
Philip Davis
Philip Davis - 05.05.2023 14:59

Was knowing nmap had the suid but something you pick up overtime?

Ответить
Oysterman's Delight
Oysterman's Delight - 01.05.2023 00:47

How do you know what the archives.php url path is?

Ответить
Daniel Cardenas
Daniel Cardenas - 07.01.2023 15:14

if you go under Krista Gordons account it says "another key?" I went down that rabbit hole lol.

Ответить
Stephen Bell
Stephen Bell - 20.12.2022 03:06

Great walkthrough. Had a problem with john the ripper though, for some reason it returned all Caps for the letters instead of All lowercase. Weird.

Ответить
SyRoxS
SyRoxS - 30.11.2022 17:06

Its funny how they put the password (ER-...) at the 858151 position in the dic file because if we use hydra like you showed us it will have to try 800k request wich takes an absurd amount of time

Ответить
hgud
hgud - 26.11.2022 18:31

how did you know the file robots.txt

Ответить
platput
platput - 05.11.2022 10:47

I got the wp user/pass in a different manner. The ip/license url for which I got 200 response, I opened and inspected using firefox's inspect context menu. There was a base64 encoded string which gave me the user/password combo. This was not visible in the view source page though.

Ответить
Azark
Azark - 15.10.2022 21:48

Thank you for the amazing help and efforts !!

Ответить
Jisoo turtle rabbit kim
Jisoo turtle rabbit kim - 02.10.2022 07:40

my wordlist is not running please advice what to do

Ответить
kilbx good
kilbx good - 20.09.2022 07:29

missing my ti line sir.

Ответить
Rui Lopes
Rui Lopes - 29.08.2022 02:33

What terminal multiplexer is that? Thanks!

Ответить
Cyber Sec
Cyber Sec - 05.08.2022 04:04

This was an amazing video, thank you.

Ответить
KasaBlanca007
KasaBlanca007 - 13.05.2022 02:22

How did you know to add "robots.txt"? Could it not have easily been "anythingelse.txt"?

Ответить
Mr Happy Smiley
Mr Happy Smiley - 01.05.2022 23:57

One thing that was very crucial in brute forcing the password for Elliot is that there is nearly a 1,000,000 words in the the fsociety.dic when in reality it should have been about 11,000 words. If you cat fsociety.dic | grep "any word in the fsociety file here", you will see a ton of the same words being used in the file. To remove all those unnecessary duplicate words, you could have done sort fsociety.dic | uniq -d > new.txt. Then right after that you would append the unique words doing sort fsociety.dic | uniq -u >> new.txt. In doing so would give you the actual amount of words for that wordlist. That would save you a ton of time finding the password in a shorter time

Ответить
Luis Hernandez
Luis Hernandez - 24.04.2022 10:50

how did you find that the shell was on wp-content/twentyfifteen/archive.php ? I was doing it on my own and I couldnt find the shell

Ответить
Anantika Tokas
Anantika Tokas - 14.04.2022 02:35

i did like the video but when I did the first key it did not work

Ответить
Nassim Dhaher
Nassim Dhaher - 27.03.2022 06:18

you can run sudo -S su robot to change to robot user

Ответить
MSWord
MSWord - 17.02.2022 19:00

What is that terminal thing? how do you make it like that?. Great video btw it helped me alot about what to look for in terms of ethical hacking.

Ответить
A P
A P - 09.02.2022 03:13

learned some new tricks, thanks dark!!

Ответить
Cyber Nemesis
Cyber Nemesis - 08.02.2022 01:28

btw.... Hello friend, I did guess the file name.... or at least found the Easter egg.

Ответить
Danny Laise
Danny Laise - 05.01.2022 02:15

If I would have run this without a walk through, which I did but was never getting anything, the wordlist would have taken 16 hours to go through. And the password was at the bottom! Was a little annoyed for just a thm room for it to take so long

Ответить
Alper Kaya
Alper Kaya - 08.12.2021 01:59

You cannot use PWD as parameter man, this issue took hours from me. It should be PASS

Ответить
Kishan Kulu
Kishan Kulu - 15.09.2021 19:41

What does -t 30 do?

Ответить
Mishanea
Mishanea - 24.07.2021 00:31

When I try to do a reverse shell with nc I can't use the port 53, it's ok to use 1234? because it doesn't work :(

Ответить
Md7
Md7 - 03.07.2021 19:13

thx :)

Ответить
HamsterLover
HamsterLover - 02.07.2021 16:06

The password is at the very end of the list, which contains many duplicates, very annoying.
To crack within a few seconds: tac fsocity.dic > reverse.dic

Ответить
Ashen Blade
Ashen Blade - 01.07.2021 13:18

tried it so many times I just cant get the password for some reason.
Everything is correct idk whats going wrong

Ответить
Giovanni Tomczak
Giovanni Tomczak - 23.06.2021 23:21

You guys put the username and password near the bottom of the list..nice..very nice

Ответить
0xsiyo
0xsiyo - 15.05.2021 15:19

Why didn't you use whole error message for password brute-force? Is it because of that block lettered "Elliot" in the response?

Ответить
Kirill Ivanov
Kirill Ivanov - 29.04.2021 21:33

Half an hour searching for password and it's not done yet... Why this file is so big???? It's a training box..

Ответить
Lexa
Lexa - 13.04.2021 18:11

I also watched another video where someone used the command (find / -perm -u = s 2> / dev / null ").
What does it do ???
(Sorry for the bad english)

Ответить
Hello Friend
Hello Friend - 07.04.2021 16:20

I couldn't find the password in the fsocity.dic file, I used python to open the file and search yet nothing popped up

Ответить
Gamliel Hernández
Gamliel Hernández - 31.03.2021 09:51

Fantastic, simple and to the point, thank you for this gem of content.
Subscribed and all notifications=on :D

Ответить
drasked
drasked - 25.03.2021 03:00

^PWD^ didnt work for me, i ended up getting it to work with ^PASS^

Ответить
MrSonnyDutch
MrSonnyDutch - 16.03.2021 16:37

you said : we are gonna take a look at a common file we find on websites , while entering the file robots.txt . is this really the way to do it ? i want to know how to get the file ,without taking it from the internet .

Ответить
0xHans
0xHans - 11.03.2021 17:53

how to view key-3-of-3.txt?
Plz help :')

Ответить
Josiah Thompson
Josiah Thompson - 06.03.2021 17:47

I did have a small issue when running hydra. the password variable did need to be ^PASS^ instead of ^PWD^

Ответить
201951073 JATIN GUPTA
201951073 JATIN GUPTA - 26.02.2021 23:22

if i m using !bash i am not getting a shell with root privileges...WHY?

Ответить
Luis Mejia
Luis Mejia - 21.02.2021 01:27

Awesome video, cant wait to do this in THM!

Ответить
Cash
Cash - 10.02.2021 20:14

Am using hydra for password its taking too long

Ответить
Bikash Jena
Bikash Jena - 25.01.2021 09:55

Does playing CTF helps in getting through bug bounty as well

Ответить
N4nduc4
N4nduc4 - 23.01.2021 21:45

DarkSec you're the best.

Ответить