Skip to main content

Important points I learned from Mr Robot CTF

I did the Mr. Robot CTF today from www.tryhackme.com, I thought it would be better to share the lessons I learned from Mr. Robot's CTF rather than writing a walkthrough (as there are tons of walkthroughs available online on Mr. Robot)

GoBuster is better than DirBuster:
I ran gobuster on the machine for quite some time but it didn't capture some pages which also included robots.txt, robots.txt is an important page and it carried some useful information, GoBuster detected robots.txt so in this case GoBuster performed better

If its "Wordpress", go nowhere but "WPScan":
If the target is wordpress-based then WPScan is your go-to tool for enumeration and bruteforcing, I tried different tools for bruteforcing credentials on the machine like Burp Intruder, Hydra, MetaSploit etc but they all took a lot of time whereas bruteforcing performed by WPScan (using XML-RPC which I'll explain next) was fast and very efficient.

XML-RPC in Wordpress:
WPScan detected XML-RPC on the Mr. Robot's machine, XML-RPC is basically an API for communication on Wordpress, its vulnerable to bruteforcing meaning there is no rate limiting on XML-RPC, there is a specific syntax for it, WPScan used exploited this vulnerability to bruteforce the machine rather than using the wp-login.php page

Always sort out and uniq the wordlist:
Well, this is a hard learnt lesson, the wordlist provided by machine contained over 8 lac records and obviously bruteforcing so many words took forever. Sorting the wordlist and using uniq on it reduced the wordlist from over 8 lac words to just 11k words, that's a massive difference.
Use the command: sort file.txt | uniq > output.txt to perform this operation

Use tun0's IP as LHOST on THM:
I got stuck here for long time, this is specific for TryHackMe users, I was setting my wlan0/eth0's IP as LHOST while trying to get shell whereas tun0's IP is the way to go. I have explained this in more detail in other blog post, to read the explanation click here


Comments

Post a Comment

Popular posts from this blog

Hacker 101 CTF Walkthrough: Petshop Pro

I am back with another walkthrough to one of the  HackerOne 's CTF Petshop Pro . Let's look at the interface of this web page.

Kali Linux 2020.1 tty1 ERROR

I found a horrible error when I installed the latest version of Kali Linux on one of my machines, after installing the OS when I started it, it booted into a black screen which asked for my login credentials without any GUI. It is heartbreaking to see problems right away in a freshly installed operating system but after some Googling, I dug out the solution which I will share with you here.  Steps to solve No GUI tty1 Error in Kali Linux 1. First log in with your user credentials 2. Write command:  cd / 3. Write command: cd etc/ 4. Write command: cd apt/ 5. Write command: cat sources.list After step 5, you will see something like this: As you can see, no repositories are mentioned here so obviously we'll have to add kali official repositories to this file.  6. Write command: sudo nano sources.list 7. Write your password 8. Now add the following repositories at the end of the editable file which is opened on the terminal: deb h...