# VulnHub ‘Mr.Robot 1’ - CTF 挑战
* [Hello VulnHub](/tLINLACqS-6MQQcnwexJAg)
* [Mr.Rotot 任务简介](/zc9G4d2lSKWBthbgVp0y1g)
* [信息收集](/X7skC1gRSYqo16ABNSwvnw)
* [先到处看看](/rieAGps-RtafGr0mIaev5w)
* [Brute Forcing 获取 WordPress 管理员密码](/YchBnNURSZ2cpra7SNgW0Q)
* [使用 wpscan 扫描 WordPress 的漏洞](/Oh3PGKO4RaWMw-6hOOIIZw)
* [通过 WordPress 漏洞在目标主机上启动 shell](/pOQwhuiGS-G3S8WwRfJXFQ)
* [利用旧版本 nmap 漏洞提权到 root 权限](/PcnBncZtTM-8zOimkM_cAw)
* [Mr.Rotot 任务通关总结](/JVVenKqjT9mk4ASwtLI09A)
{"metaMigratedAt":"2023-06-18T03:26:13.317Z","metaMigratedFrom":"YAML","title":"VulnHub ‘Mr.Robot 1’ - CTF 挑战","breaks":true,"contributors":"[{\"id\":\"24a79e50-d2b6-4a07-941e-3987e89a733f\",\"add\":509,\"del\":24}]"}
VulnHub ‘Mr.Robot 1’ - CTF 挑战