Mr. Robot CTF Walkthrough - Part 2

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 ธ.ค. 2024

ความคิดเห็น •

  • @rrittenhouse
    @rrittenhouse 6 ปีที่แล้ว +58

    Stop apologizing, man! :D You're fine! Thanks for the videos.

  • @bbryce13
    @bbryce13 6 ปีที่แล้ว +47

    Loved how excited you got when you would find a key! I can’t wait to watch you do another CTF. Keep up the awesome vids.

    • @HackerSploit
      @HackerSploit  6 ปีที่แล้ว +10

      I got a little bit too exited

    • @rashidshaikh550
      @rashidshaikh550 4 ปีที่แล้ว

      @@HackerSploit its ok bro😊

  • @faysalahmed7251
    @faysalahmed7251 5 ปีที่แล้ว +2

    I think ur trial and error method with wide explanation is absolutely perfect for our learning. Keep making lots of ctf video plz. God bless u.

  • @Levendo
    @Levendo 6 ปีที่แล้ว +37

    I don't usually watch long vids but this one was pretty interesting. Kept me hooked throughout.
    PS. not hacker. I know pretty much nothin about it.

  • @abhijeetkarna3229
    @abhijeetkarna3229 4 ปีที่แล้ว +1

    Oh man!! When you say hope you find value in this video...you know these videos are unique and much more informative. Thank you

  • @mf9362
    @mf9362 6 ปีที่แล้ว +1

    Was nice to watch you going through it finding your way instead of a perfect and fully edited video. Much more interesting to see your real thought process and where you get stuck and how you solve it!

  • @vid_da-m1y
    @vid_da-m1y 6 ปีที่แล้ว +1

    Love those kind of your long videos more than short videos bcoz there are more information, techniques and more things to learn from you, how you went through is amazing.

  • @davidleitman
    @davidleitman 3 ปีที่แล้ว +1

    Thank you man - you're vid let us feel the frustration probably unintentionally helpful, at least for me

  • @themadhack3r431
    @themadhack3r431 5 ปีที่แล้ว +1

    Watched all start to finish. Another great video this one was super fun!!😀

  • @TheJoker-141
    @TheJoker-141 6 ปีที่แล้ว

    Very nice work as a student currently finishing a degree in cyber security and digital forensics my passion is pen testing can't get enough of it ! Really helpful you have a great mind set for a pen tester which separates us security fanatics from general IT. Keep up the good work. From 🇮🇪🇮🇪

  • @louiem5985
    @louiem5985 6 ปีที่แล้ว

    DUDE!!! This was awesome how you showed and how you think on getting the flags. I been trying to learn on how to CTF for a while but didn't know where to start or what I should be learning. Keep up the good work, and you should do something like pentesting 101 basic, to advance. Where to start and move on from there. I think a lot of people would benefit from it. Even tho you think you did mistakes it's good to show them that way regular users understand the mistakes and the different tools and command it takes to learn.
    Great job once again. Look forward on following the channel and learning my first steps in pen-testing.

  • @MrGFYne1337357
    @MrGFYne1337357 6 ปีที่แล้ว +2

    hsploit, still watching; you got this bro

  • @nick012221
    @nick012221 5 ปีที่แล้ว +1

    This was so awesome!! thank you for taking the time to walk through this!

  • @nirajjain6772
    @nirajjain6772 6 ปีที่แล้ว +1

    Always a good teacher you are. I wish i could come there as a intern to work with you. Also, you need to hold your horses while typing man.

  • @EnzoRides
    @EnzoRides 6 ปีที่แล้ว

    This series is really great, I wanna see more like this, u rock man :)

  • @stuartg40
    @stuartg40 5 ปีที่แล้ว

    Lots of educational material here. Excellent, thank you.

  • @joemama-js6hv
    @joemama-js6hv 6 ปีที่แล้ว +1

    this has been such an enjoyable series. like a video game for big boys lol

  • @deansmith2012
    @deansmith2012 6 ปีที่แล้ว +1

    Your so entertaining to watch I love it, I subbed :)

  • @rainerzufall4268
    @rainerzufall4268 3 ปีที่แล้ว

    I thank you for sharing your knowledge. Best greetings from Germany.

  • @cyber_warrior11
    @cyber_warrior11 5 ปีที่แล้ว

    Really bro your videos are awesome explained very properly throught good job keep it up and thank you bro God bless you

  • @Mahesh-gq7fm
    @Mahesh-gq7fm 5 ปีที่แล้ว

    It's a great learning fr us. Tnx for the series

  • @SweeTgaMerz1
    @SweeTgaMerz1 4 ปีที่แล้ว

    Really good stuff man learned a lot thank you.

  • @quentinlassalle1321
    @quentinlassalle1321 6 ปีที่แล้ว

    Amazing stuff man! I've really enjoyed watching the two videos, they were really educational and I've learned a lot! A little suggestion is that it would be even better if you could explain more what you do and why you do it

  • @prnxid
    @prnxid 6 ปีที่แล้ว +1

    Great series! I waiting for metasploitable 1 & 2 & 3

  • @cambellajoe
    @cambellajoe 5 ปีที่แล้ว +1

    Really enjoyed this :-)

  • @MrGFYne1337357
    @MrGFYne1337357 6 ปีที่แล้ว +1

    Hsploit, i love watching you hack, lulz, you ROCK dude!

    • @HackerSploit
      @HackerSploit  6 ปีที่แล้ว +2

      Thanks mate, and thank you very much for your support. You have been a long time sub and a great help. It is much appreciated

  • @sowhatsupeirik
    @sowhatsupeirik 6 ปีที่แล้ว

    Nice stuff! I’d love to see more CTF’s.

  • @akshayshinde3057
    @akshayshinde3057 4 ปีที่แล้ว

    Man u r awesome...Thank you so much for such great content :))

  • @edwinjohn5140
    @edwinjohn5140 10 หลายเดือนก่อน

    Great video from a great guy ! Gracias

  • @puppykiwi4248
    @puppykiwi4248 5 ปีที่แล้ว

    Not to send any mixed signals or something but his voice is amazing

    • @mrkiky
      @mrkiky 5 ปีที่แล้ว

      Especially when he was saying "please give me the hash man" LOL

  • @ryanbishop3781
    @ryanbishop3781 6 ปีที่แล้ว

    Excellent. Thank you!

  • @Dn0de
    @Dn0de ปีที่แล้ว

    upgrading the reserve shell
    python -c 'import pty; pty.spawn("/bin/bash")'
    instead of >>>>>>>>>>>>>>> python -c 'import pty; pty.spawn("/bin/sh")' i guess that's why i wasn't working.
    Thanks Alex for the tutorial i really wanted to see the exploit with metasploit.

  • @mrd7901
    @mrd7901 6 ปีที่แล้ว +2

    I loving it ❤❤❤❤❤❤✌..

  • @mohammadaminrajabi1828
    @mohammadaminrajabi1828 5 ปีที่แล้ว

    Thanks man. You are great.

  • @zll3111
    @zll3111 ปีที่แล้ว

    讲的太好了~👍

  • @mrrobot7029
    @mrrobot7029 6 ปีที่แล้ว

    Its amazing thanks dude😅

  • @KashifAli-vj5db
    @KashifAli-vj5db 6 ปีที่แล้ว

    owsome man 😎 in meterpeter, you was bad at SET RPORT

  • @dipanshujha7293
    @dipanshujha7293 6 ปีที่แล้ว

    Hey Alexis, nice video up there just plz make a video on elaborating those python you imported to find shell, the post method you used in hydra and the find command you used to get id's of users. The video was great again, Thank you

  • @abinashkisku5805
    @abinashkisku5805 2 ปีที่แล้ว

    Nice ☺️👍

  • @Himas_Valiant_Enemy
    @Himas_Valiant_Enemy 5 ปีที่แล้ว

    Peace dude.. its really awesome

  • @DhrubajyotiDey
    @DhrubajyotiDey 6 ปีที่แล้ว

    Well done very nice video.. :)

  • @lamanifaudelhani4286
    @lamanifaudelhani4286 6 ปีที่แล้ว +4

    Good Dude

  • @NumaanAhmad911
    @NumaanAhmad911 2 ปีที่แล้ว

    I simple terms ur awsome

  • @dariuszs5300
    @dariuszs5300 6 ปีที่แล้ว +2

    I have one question: while getting access to key 2 of 3 you logged in as SU, and you couldn’t access root. Then you logged in again as SU but from Nmap, and it worked. Why it didn’t work without nmap while you were logged in as “robot”?

    • @louissmith4024
      @louissmith4024 5 ปีที่แล้ว +2

      I dont know how relevant your question still is, but the nmap binary is owned by root and also has the suid permission bit. He was able to use nmap's interactive mode to spawn an elevated shell with the command "!sh". Take a look at this link.
      pentestlab.blog/category/privilege-escalation/

  • @satejratnaparkhi
    @satejratnaparkhi 2 ปีที่แล้ว

    Legends like me first solve the room and then watching the MR. ROBOT 😂

  • @EndisuKKJJ
    @EndisuKKJJ 3 ปีที่แล้ว

    Nice 👌🏻

  • @lahirusandaruwan6124
    @lahirusandaruwan6124 3 ปีที่แล้ว

    wew grate video serius...

  • @Tony_Hylfilger
    @Tony_Hylfilger 6 ปีที่แล้ว +4

    can you make a video how to scanning nmap with scripts

  • @MikeTrieu
    @MikeTrieu 6 ปีที่แล้ว +1

    Does your terminal not do tab completion or command history navigation because you seem to be doing a lot of manual re-typing which chews up a lot of your efficiency.

  • @extremetechz4625
    @extremetechz4625 6 ปีที่แล้ว

    well done!!! :-)

  • @inamullahbaloch2954
    @inamullahbaloch2954 5 ปีที่แล้ว

    Wow men you great

  • @douglasmclainberdeaux1534
    @douglasmclainberdeaux1534 6 ปีที่แล้ว

    no, the second key does not "require root". do an "ls -lah" to show permissions and enumerate more thoroughly.

    • @douglasmclainberdeaux1534
      @douglasmclainberdeaux1534 6 ปีที่แล้ว

      also, "export TERM=vt102" or some other valid terminal after doing the python tty thing you did.

  • @dannystorage9951
    @dannystorage9951 6 ปีที่แล้ว

    thanks bro

  • @arkadeepd351
    @arkadeepd351 4 ปีที่แล้ว +1

    Your metasploit did not work because your router had blocked port forwarding. Either you open the ports Manully or you can use payload like bind_tcp or something.. i came accross the same problem and i fixed in this way and did the whole process using metasploit

  • @davidwiklund
    @davidwiklund 6 ปีที่แล้ว

    Nice tutorials as usual,
    I'm wondering about this Parrot OS that you using on this video is it installed on VM or you installed it as a main system
    and also your Kali lInux you use them as host machine or main OS? because they run very smoothly ...
    i have Macbook pro 2017 and i'm installing Kali on VMware fusion and is not running as fast as yours
    Thanks!

    • @HackerSploit
      @HackerSploit  6 ปีที่แล้ว +1

      I installed it on my main machine.

    • @davidwiklund
      @davidwiklund 6 ปีที่แล้ว

      Nice, but one thing, when I tried installed Kali on dual boot alongside with MacBook Pro I can’t use the keyboard or the trackpad but I can use external mouse and keyboard. Is there anyway to use built-in mouse and trackpad on Mac with Kali Linux?

  • @albertmendoza3673
    @albertmendoza3673 4 ปีที่แล้ว

    ¡¡Excelente!!

  • @phyzix_phyzix
    @phyzix_phyzix 5 ปีที่แล้ว +1

    How did he go from user robot to root access? Just by going into nmap interactive and opening a shell?

    • @zikrifadzil01
      @zikrifadzil01 5 ปีที่แล้ว +1

      There's an exploit in nmap where we can get root access.. What he did was what it actually was.. a popular escalation privilege exploit

    • @jackcarter1897
      @jackcarter1897 2 ปีที่แล้ว +1

      The command he used before lists all the programs on the server that run automatically as root. For example ‘passwd’. That needs to run as root in order to change the hash values in the system files to change the users password. He noticed nmap was in there. Because nmap has a feature to spawn a shell, if you decide to run nmap, it automatically runs as root, then when you spawn a shell from nmap, it spawns the shell as root because that’s what it’s running on. That’s how he was able to gain root access.

  • @CipherByteX
    @CipherByteX ปีที่แล้ว

    thank youuuu

  • @DailyDoesOfWords
    @DailyDoesOfWords 2 ปีที่แล้ว

    Great video! Im stuck at: 4:00 I cant get any response from reverse shell. It just keeps listening and no results when I do curl command :S Can anyone help me out ?

    • @chandraprakashpandian
      @chandraprakashpandian 2 ปีที่แล้ว

      check your ip and port number, make sure that you have given the tun0 ip in the php code, i made the same mistake later corrected it

  • @arjunpeter9614
    @arjunpeter9614 4 ปีที่แล้ว

    Python part is interesting

  • @anukoolsrivastava4235
    @anukoolsrivastava4235 6 ปีที่แล้ว

    maybe you could use ctrl c or ctrl z ..etc. to come out of current running process without killing the applicaton.

    • @HackerSploit
      @HackerSploit  6 ปีที่แล้ว +1

      It is running as daemon, so it will close the connection, not exit.

  • @Najumulsaqib
    @Najumulsaqib 5 ปีที่แล้ว

    YESSSS!!!

  • @DNozz777
    @DNozz777 5 ปีที่แล้ว

    Hes the man..

  • @1roOt
    @1roOt 6 ปีที่แล้ว

    how did you know you had to go to /root ? and how can you possibly know all the commands with correct arguments after a year? especially the python one? and i have many more questions... sorry i am sceptical. did you really do this on first try? ;)

    • @1roOt
      @1roOt 6 ปีที่แล้ว

      oh and the big giveaway was the "find / -perm..." at 11:30. seemed like you didn't really understand what you were doing. am i wrong? o.O

  • @llellouche
    @llellouche 6 ปีที่แล้ว +5

    I think metasploit failed bcz you didn't set lport and lhost bcz you wanted reverse shell and you need those 2 to bind it

  • @ulbss8892
    @ulbss8892 4 ปีที่แล้ว

    Why does the final step of summoning sh works, but if i run a bash shell i have no root permissions??

  • @nogoodhacker6944
    @nogoodhacker6944 3 ปีที่แล้ว

    Hi, it worked for me last year, but now when i tried to follow the walthrough (as i'm very weak) it just throws me a blank white page when i try to hit 404.php,
    tried curl as well as in browser, vm is fine and robot.ova is also running fine but still having trouble...

  • @GoogleUser-uv5ci
    @GoogleUser-uv5ci 6 ปีที่แล้ว

    More video pls .........sir

  • @VeNoM____
    @VeNoM____ 3 ปีที่แล้ว

    Great tutorial man but i cannot get the reverse shell to work. I keep getting connection refused and i have tried both the archives and php files.

  • @purushothamsharma1255
    @purushothamsharma1255 5 ปีที่แล้ว

    Your CTF video awesome. Make one more video from hackerbox.eu many beginner have no idea how to interact with that website and how to use it.

  • @Korkugamer36
    @Korkugamer36 2 ปีที่แล้ว

    I get the answer su: must be run from a terminal, why do you think that might be?

  • @alexanderfriis7375
    @alexanderfriis7375 3 หลายเดือนก่อน

    After I copied the reverse shell into the editor and updated it the site do not function anymore... like I can't connect to it. PLEASE HELP!

  • @mohammadabdussamad2258
    @mohammadabdussamad2258 6 ปีที่แล้ว +1

    Well... I ran dirb and found a license(200) and surprisingly i found the user elliot and the password... I was saved the brute force.... 😁..

  • @Jojo_clowning
    @Jojo_clowning 6 ปีที่แล้ว

    What linux os is that ?

  • @ronakrawal8325
    @ronakrawal8325 6 ปีที่แล้ว

    Please Upload More CTF

  • @manabjyotisaikia
    @manabjyotisaikia 6 ปีที่แล้ว

    it just Waooooooooo.........

  • @hutchmedia9867
    @hutchmedia9867 4 ปีที่แล้ว

    Curl is not working
    as you mention in the video ??

    • @ENGCY-Mir
      @ENGCY-Mir 4 ปีที่แล้ว

      Upload reverse php in archives.php instead 404.php
      It will work

    • @hutchmedia9867
      @hutchmedia9867 4 ปีที่แล้ว

      @@ENGCY-Mir yes i uploaded but how to execute. if write after ip its display all the payloads in browser

  • @sudeep.g
    @sudeep.g 6 ปีที่แล้ว

    please please make a video on temple of doom from vulnhub

  • @ko-Daegu
    @ko-Daegu 6 ปีที่แล้ว

    Hi sir what happened to SS7 exploit

    • @HackerSploit
      @HackerSploit  6 ปีที่แล้ว +2

      I will be uploading it to the website

  • @NumaanAhmad911
    @NumaanAhmad911 2 ปีที่แล้ว

    Bro i am not able to find ctf playlist

  • @kuga9512
    @kuga9512 6 ปีที่แล้ว

    What are the keys for?

    • @llellouche
      @llellouche 6 ปีที่แล้ว +2

      Haroons Gaming Channel the keys are proof of success that's why we call it catch the flag (CTF)

  • @attention_shopping
    @attention_shopping 5 ปีที่แล้ว

    gr8

  • @hacktronian
    @hacktronian 6 ปีที่แล้ว

    Next : Facebook CTF

  • @shane3046
    @shane3046 6 ปีที่แล้ว

    For some reason when I type su - robot it tells me su: must be run from a terminal.

    • @camalmuradov274
      @camalmuradov274 6 ปีที่แล้ว

      python -c 'import pty; pty.spawn("/bin/sh")'

  • @supimjocktopus
    @supimjocktopus 6 ปีที่แล้ว

    I keep getting a connection refused (111) when i try to set up the reverse shell :(

    • @dox432
      @dox432 5 ปีที่แล้ว

      You need to put your own IP in the 404 php file (not the mr. robot server's ip)

    • @ENGCY-Mir
      @ENGCY-Mir 4 ปีที่แล้ว

      Bro i got the same
      Try archives.php instead of 404.php it worked for me

  • @HackUS
    @HackUS 6 ปีที่แล้ว

    Blueborne video please

  • @ubaldosanjuansanjuan2393
    @ubaldosanjuansanjuan2393 2 ปีที่แล้ว

    And, what is the password for the Root user?

  • @StdLemon
    @StdLemon 6 ปีที่แล้ว

    Why you were able to access root folder after launching shell from nmap?

    • @daniel22587
      @daniel22587 6 ปีที่แล้ว +1

      Because once you are in nmap you are treated like a super user

  • @atharvas4399
    @atharvas4399 6 ปีที่แล้ว

    what is ctf?

    • @smp2679
      @smp2679 6 ปีที่แล้ว

      capture the flag, should try it, lots of fun recommend try on overthewire by starting from bandit level

  • @unknown-vq1gj
    @unknown-vq1gj 5 ปีที่แล้ว

    what this pty this is doing?

  • @jithinjacob2201
    @jithinjacob2201 5 ปีที่แล้ว

    Can anyone please tell me how can i get $(shell) to root@hostname? #hackersploit

  • @muhammadilyas2179
    @muhammadilyas2179 4 ปีที่แล้ว

    That was LiT ("_")

  • @EchoXIIIGO
    @EchoXIIIGO 6 ปีที่แล้ว

    But in a real world example you wouldn't have access to the server wp panel hahah, just another die hard script kiddie that learned metasploit