# VulnHub ‘Mr.Robot 1’ - CTF 挑战 * [Hello VulnHub](/tLINLACqS-6MQQcnwexJAg) * [Mr.Rotot 任务简介](/zc9G4d2lSKWBthbgVp0y1g) * [信息收集](/X7skC1gRSYqo16ABNSwvnw) * [先到处看看](/rieAGps-RtafGr0mIaev5w) * [Brute Forcing 获取 WordPress 管理员密码](/YchBnNURSZ2cpra7SNgW0Q) * [使用 wpscan 扫描 WordPress 的漏洞](/Oh3PGKO4RaWMw-6hOOIIZw) * [通过 WordPress 漏洞在目标主机上启动 shell](/pOQwhuiGS-G3S8WwRfJXFQ) * [利用旧版本 nmap 漏洞提权到 root 权限](/PcnBncZtTM-8zOimkM_cAw) * [Mr.Rotot 任务通关总结](/JVVenKqjT9mk4ASwtLI09A)
{"metaMigratedAt":"2023-06-18T03:26:13.317Z","metaMigratedFrom":"YAML","title":"VulnHub ‘Mr.Robot 1’ - CTF 挑战","breaks":true,"contributors":"[{\"id\":\"24a79e50-d2b6-4a07-941e-3987e89a733f\",\"add\":509,\"del\":24}]"}
Expand menu