Mr Robot CTF TryHackMe Part 2 | Gobuster Enumeration, WordPress Discovery & Reverse Shell
Автор: ThalaBytes
Загружено: 2026-01-31
Просмотров: 3
Описание:
In this video, we continue solving the Mr Robot CTF on TryHackMe – Part 2, focusing on web enumeration and early exploitation techniques. This is an uncut, real-world walkthrough, where mistakes, retries, and exploration are kept to help beginners understand the real hacking mindset.
We start by analyzing Apache and OpenSSH services, then move into directory and file enumeration using Gobuster. Since no sitemap is available, we rely on robots.txt and wordlists to discover hidden directories, files, and WordPress components.
As the lab progresses, we identify WordPress-related paths, explore restricted directories, analyze downloaded files, and move toward exploitation concepts, including reverse shell fundamentals using PHP and Netcat.
Topics covered in this video:
Apache & OpenSSH service analysis
Directory enumeration using Gobuster
Understanding robots.txt in CTFs
WordPress discovery and enumeration
Finding hidden files and directories
Reverse shell basics (PHP & Netcat)
Beginner-friendly exploitation workflow
Real-world reconnaissance methodology
This video is ideal for TryHackMe beginners, CTF learners, ethical hacking students, and anyone learning web application penetration testing using Kali Linux.
👍 Like, 🔔 Subscribe, and 💬 Comment if you want Part 3 of the Mr Robot CTF walkthrough!
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: