+ {{- range .Pages }}
+ {{- if eq .Kind "page" }}
+
+
+ {{- .Title | markdownify }}
+ {{- if .Draft }}
+
+
+
+ {{- end }}
+
+
+ {{- partial "post_meta.html" . -}}
+
+
+
+ {{- end }}
+ {{- end }}
+
+
+ {{- end }}
+
+{{- end }}
+{{- end }}
+
+{{- end }}{{/* end main */}}
diff --git a/public/404.html b/public/404.html
index b44003f..9053270 100644
--- a/public/404.html
+++ b/public/404.html
@@ -1,5 +1,5 @@
-404 Page not found | Kaliban's Blog
-
After loggin in the remote host you can use a set of commands to understand where are you and what files are in your directory:
pwd this command show the name of the working directory, the directory you’re in right now.
ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files.
cat read the content of a file and print them to standard output.
bandit0@bandit:~$ ls
+pwd this command show the name of the working directory, the directory you’re in right now. ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files.">
After loggin in the remote host you can use a set of commands to understand where are you and what files are in your directory:
pwd this command show the name of the working directory, the directory you’re in right now.
ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files.
cat read the content of a file and print them to standard output.
OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
I worked through the levels and decided to write a walkthrough for my blog. There are already walkthroughs on the internet, from different persons and with different solutions. However, I still decided to publish mine, to at the very least get more comfortable with writing and maybe, since my explanations and thought processes may vary from other writers, help someone understand the solutions better. Also, this way future me has a reference to look back at.
I will try to explain the important concepts shortly, however, there is always a lot more we can learn about them. What the game and I would encourage you to do, is research on your own.
Great, now that you know what this article is about and why I am doing this, let’s start with the walkthrough of Level 0.
This challenge wants us to user SSH, which stands for Secure Shell, is a cryptographic network protocol used to securely access and manage network devices and servers over an insecure network. It provides a secure channel over an unsecured network by using encryption to protect the communication between the client and the server.
Key features of SSH include:
+I worked through the levels and decided to write a walkthrough for my blog.">
OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
I worked through the levels and decided to write a walkthrough for my blog. There are already walkthroughs on the internet, from different persons and with different solutions. However, I still decided to publish mine, to at the very least get more comfortable with writing and maybe, since my explanations and thought processes may vary from other writers, help someone understand the solutions better. Also, this way future me has a reference to look back at.
I will try to explain the important concepts shortly, however, there is always a lot more we can learn about them. What the game and I would encourage you to do, is research on your own.
Great, now that you know what this article is about and why I am doing this, let’s start with the walkthrough of Level 0.
This challenge wants us to user SSH, which stands for Secure Shell, is a cryptographic network protocol used to securely access and manage network devices and servers over an insecure network. It provides a secure channel over an unsecured network by using encryption to protect the communication between the client and the server.
Key features of SSH include:
- Secure Remote Login: Allows users to securely log into a remote machine.
- Command Execution: Enables users to run commands on a remote server.
- File Transfer: Facilitates secure file transfers through protocols like SCP (Secure Copy Protocol) and SFTP (SSH File Transfer Protocol).
- Port Forwarding: Supports tunneling of network services over a secure connection.
SSH helps ensure that data transmitted between the client and server remains confidential and protected from eavesdropping and tampering.
It is a very common service. So common in fact that it was assigned its own standard port, Port 22. A port is an endpoint that allows your computer to know which service should be accessed - kind of like office room numbers, so you know in which room the person you need to talk to is.
We log in to the remote host with the right credentials
~$: ssh bandit1@bandit.labs.overthewire.org -p 2220
+Solution We log in to the remote host with the right credentials ~$: ssh bandit1@bandit.labs.overthewire.org -p 2220 Search for the file and read it. bandit1@bandit~$: ls - bandit1@bandit~$: cat ./- 263JGJPfgU6LtdEvgfWU1XP5yac29mFx We can now proceed to the next challenge.">
We can’t read a file that has a space in its filename normally. To read it we can simply put the name of the file between quotes "filname" and then we can read it.
Log in to the remote host with the credentials from the last level.
~$: ssh bandit2@bandit.labs.overthewire.org -p 2220
+Solution Log in to the remote host with the credentials from the last level. ~$: ssh bandit2@bandit.'>
We can’t read a file that has a space in its filename normally. To read it we can simply put the name of the file between quotes "filname" and then we can read it.
To find an hidden file in a linux filesystem is really easy, we can use the ls command to list every file in the directory adding to it the -a attribute to list hidden files too. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities.
SSH in to the remote host with the above credentials.
~$: ssh bandit3@bandit.labs.overthewire.org -p 2220
+Theory To find an hidden file in a linux filesystem is really easy, we can use the ls command to list every file in the directory adding to it the -a attribute to list hidden files too. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities.">
To find an hidden file in a linux filesystem is really easy, we can use the ls command to list every file in the directory adding to it the -a attribute to list hidden files too. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities.
Go inside the inhere directory and list all files to read the content of the hidden one.
bandit3@bandit~$: cd inhere
bandit3@bandit~$: ls -a
. .. ...Hiding-From-You
bandit3@bandit~$: cat ...Hiding-From-You
2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
-
To find what file is human-readable we can check the type of data inside the file. To do that we can use the file command, some examples would be: ASCII text, directory, POSIX tar archive. Trying to read a non human-readable file would show something like this in the output l�����]�a߯-@gQ�÷�wz�P�ߠy�.
To find what file is human-readable we can check the type of data inside the file. To do that we can use the file command, some examples would be: ASCII text, directory, POSIX tar archive. Trying to read a non human-readable file would show something like this in the output l�����]�a߯-@gQ�÷�wz�P�ߠy�.
To solve this task, we’ll use a combination of basic Linux commands to search for and identify the file with the specified properties. Let’s break down the key commands we’ll be using:
find Command
The find command in Linux is a powerful tool that allows users to search for files and directories based on various criteria.
-find [path] [conditions]: Basic syntax for the find command.
-type f: This condition specifies that we are looking for regular files (not directories).
-size [size]: Finds files of a specific size. The size can be specified in different units like bytes (c), kilobytes (k), etc. For our task, we’ll use 1033c to specify 1033 bytes.
-executable: Checks if a file is executable.
! -executable: Ensures the file is not executable.
xargs Command
The xargs command is used to build and execute command lines from standard input. In our case, it can be used to perform actions on the results returned by the find command.
file Command
The file command is used to determine the type of a file. It can help verify if a file is human-readable.
To solve this task, we’ll use a combination of basic Linux commands to search for and identify the file with the specified properties. Let’s break down the key commands we’ll be using:
find Command
The find command in Linux is a powerful tool that allows users to search for files and directories based on various criteria.
-find [path] [conditions]: Basic syntax for the find command.
-type f: This condition specifies that we are looking for regular files (not directories).
-size [size]: Finds files of a specific size. The size can be specified in different units like bytes (c), kilobytes (k), etc. For our task, we’ll use 1033c to specify 1033 bytes.
-executable: Checks if a file is executable.
! -executable: Ensures the file is not executable.
xargs Command
The xargs command is used to build and execute command lines from standard input. In our case, it can be used to perform actions on the results returned by the find command.
file Command
The file command is used to determine the type of a file. It can help verify if a file is human-readable.