After loggin in the remote host you can use a set of commands to understand where are you and what files are in your directory:
pwd this command show the name of the working directory, the directory you’re in right now.
ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files.
cat read the content of a file and print them to standard output.
bandit0@bandit:~$ ls
+pwd this command show the name of the working directory, the directory you’re in right now. ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files.">
After loggin in the remote host you can use a set of commands to understand where are you and what files are in your directory:
pwd this command show the name of the working directory, the directory you’re in right now.
ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files.
cat read the content of a file and print them to standard output.
OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
I worked through the levels and decided to write a walkthrough for my blog. There are already walkthroughs on the internet, from different persons and with different solutions. However, I still decided to publish mine, to at the very least get more comfortable with writing and maybe, since my explanations and thought processes may vary from other writers, help someone understand the solutions better. Also, this way future me has a reference to look back at.
I will try to explain the important concepts shortly, however, there is always a lot more we can learn about them. What the game and I would encourage you to do, is research on your own.
Great, now that you know what this article is about and why I am doing this, let’s start with the walkthrough of Level 0.
This challenge wants us to user SSH, which stands for Secure Shell, is a cryptographic network protocol used to securely access and manage network devices and servers over an insecure network. It provides a secure channel over an unsecured network by using encryption to protect the communication between the client and the server.
Key features of SSH include:
+I worked through the levels and decided to write a walkthrough for my blog.">
OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
I worked through the levels and decided to write a walkthrough for my blog. There are already walkthroughs on the internet, from different persons and with different solutions. However, I still decided to publish mine, to at the very least get more comfortable with writing and maybe, since my explanations and thought processes may vary from other writers, help someone understand the solutions better. Also, this way future me has a reference to look back at.
I will try to explain the important concepts shortly, however, there is always a lot more we can learn about them. What the game and I would encourage you to do, is research on your own.
Great, now that you know what this article is about and why I am doing this, let’s start with the walkthrough of Level 0.
This challenge wants us to user SSH, which stands for Secure Shell, is a cryptographic network protocol used to securely access and manage network devices and servers over an insecure network. It provides a secure channel over an unsecured network by using encryption to protect the communication between the client and the server.
Key features of SSH include:
- Secure Remote Login: Allows users to securely log into a remote machine.
- Command Execution: Enables users to run commands on a remote server.
- File Transfer: Facilitates secure file transfers through protocols like SCP (Secure Copy Protocol) and SFTP (SSH File Transfer Protocol).
- Port Forwarding: Supports tunneling of network services over a secure connection.
SSH helps ensure that data transmitted between the client and server remains confidential and protected from eavesdropping and tampering.
It is a very common service. So common in fact that it was assigned its own standard port, Port 22. A port is an endpoint that allows your computer to know which service should be accessed - kind of like office room numbers, so you know in which room the person you need to talk to is.
We log in to the remote host with the right credentials
~$: ssh bandit1@bandit.labs.overthewire.org -p 2220
+Solution We log in to the remote host with the right credentials ~$: ssh bandit1@bandit.labs.overthewire.org -p 2220 Search for the file and read it. bandit1@bandit~$: ls - bandit1@bandit~$: cat ./- 263JGJPfgU6LtdEvgfWU1XP5yac29mFx We can now proceed to the next challenge.">
We can’t read a file that has a space in its filename normally. To read it we can simply put the name of the file between quotes "filname" and then we can read it.
Log in to the remote host with the credentials from the last level.
~$: ssh bandit2@bandit.labs.overthewire.org -p 2220
+Solution Log in to the remote host with the credentials from the last level. ~$: ssh bandit2@bandit.'>
We can’t read a file that has a space in its filename normally. To read it we can simply put the name of the file between quotes "filname" and then we can read it.
To find an hidden file in a linux filesystem is really easy, we can use the ls command to list every file in the directory adding to it the -a attribute to list hidden files too. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities.
SSH in to the remote host with the above credentials.
~$: ssh bandit3@bandit.labs.overthewire.org -p 2220
+Theory To find an hidden file in a linux filesystem is really easy, we can use the ls command to list every file in the directory adding to it the -a attribute to list hidden files too. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities.">
To find an hidden file in a linux filesystem is really easy, we can use the ls command to list every file in the directory adding to it the -a attribute to list hidden files too. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities.
Go inside the inhere directory and list all files to read the content of the hidden one.
bandit3@bandit~$: cd inhere
bandit3@bandit~$: ls -a
. .. ...Hiding-From-You
bandit3@bandit~$: cat ...Hiding-From-You
2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
-
To find what file is human-readable we can check the type of data inside the file. To do that we can use the file command, some examples would be: ASCII text, directory, POSIX tar archive. Trying to read a non human-readable file would show something like this in the output l�����]�a߯-@gQ�÷�wz�P�ߠy�.
To find what file is human-readable we can check the type of data inside the file. To do that we can use the file command, some examples would be: ASCII text, directory, POSIX tar archive. Trying to read a non human-readable file would show something like this in the output l�����]�a߯-@gQ�÷�wz�P�ߠy�.
To solve this task, we’ll use a combination of basic Linux commands to search for and identify the file with the specified properties. Let’s break down the key commands we’ll be using:
find Command
The find command in Linux is a powerful tool that allows users to search for files and directories based on various criteria.
-find [path] [conditions]: Basic syntax for the find command.
-type f: This condition specifies that we are looking for regular files (not directories).
-size [size]: Finds files of a specific size. The size can be specified in different units like bytes (c), kilobytes (k), etc. For our task, we’ll use 1033c to specify 1033 bytes.
-executable: Checks if a file is executable.
! -executable: Ensures the file is not executable.
xargs Command
The xargs command is used to build and execute command lines from standard input. In our case, it can be used to perform actions on the results returned by the find command.
file Command
The file command is used to determine the type of a file. It can help verify if a file is human-readable.
To solve this task, we’ll use a combination of basic Linux commands to search for and identify the file with the specified properties. Let’s break down the key commands we’ll be using:
find Command
The find command in Linux is a powerful tool that allows users to search for files and directories based on various criteria.
-find [path] [conditions]: Basic syntax for the find command.
-type f: This condition specifies that we are looking for regular files (not directories).
-size [size]: Finds files of a specific size. The size can be specified in different units like bytes (c), kilobytes (k), etc. For our task, we’ll use 1033c to specify 1033 bytes.
-executable: Checks if a file is executable.
! -executable: Ensures the file is not executable.
xargs Command
The xargs command is used to build and execute command lines from standard input. In our case, it can be used to perform actions on the results returned by the find command.
file Command
The file command is used to determine the type of a file. It can help verify if a file is human-readable.
Over The Wire - Bandit 5 -> 6
- https://kaliban2056.github.io/posts/overthewire-bandit-5-6/
+ http://localhost:1313/posts/overthewire-bandit-5-6/
Wed, 07 Aug 2024 12:31:20 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-5-6/
+ http://localhost:1313/posts/overthewire-bandit-5-6/Task Find the only file that respect these requirements and read its content.
The requirements are:
human-readable 1033 bytes in size not executable Login SSH: bandit5@bandit.labs.overthewire.org -p 2220
@@ -38,9 +38,9 @@ The find command in Linux is a powerful tool that allows users to search for fil
Over The Wire - Bandit 4 -> 5
- https://kaliban2056.github.io/posts/overthewire-bandit-4-5/
+ http://localhost:1313/posts/overthewire-bandit-4-5/
Wed, 07 Aug 2024 11:50:31 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-4-5/
+ http://localhost:1313/posts/overthewire-bandit-4-5/Task Find the only human-readable file inside the inhere directory.
Login SSH: bandit4@bandit.labs.overthewire.org -p 2220
Password: 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
@@ -49,9 +49,9 @@ Solution SSH in to the remote host again and go to the inhere directory.
Over The Wire - Bandit 3 -> 4
- https://kaliban2056.github.io/posts/overthewire-bandit-3-4/
+ http://localhost:1313/posts/overthewire-bandit-3-4/
Wed, 07 Aug 2024 11:40:36 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-3-4/
+ http://localhost:1313/posts/overthewire-bandit-3-4/Task Find and read the content of the hidden file in the inhere directory.
Login SSH: bandit3@bandit.labs.overthewire.org -p 2220
Password: MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
@@ -59,9 +59,9 @@ Theory To find an hidden file in a linux filesystem is really easy, we can use t
Over The Wire - Bandit 2 -> 3
- https://kaliban2056.github.io/posts/overthewire-bandit-2-3/
+ http://localhost:1313/posts/overthewire-bandit-2-3/
Tue, 06 Aug 2024 17:51:53 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-2-3/
+ http://localhost:1313/posts/overthewire-bandit-2-3/Task Read the content of the file called “spaces in this filename”.
Login SSH: bandit2@bandit.labs.overthewire.org -p 2220
Password: 263JGJPfgU6LtdEvgfWU1XP5yac29mFx
@@ -70,9 +70,9 @@ Solution Log in to the remote host with the credentials from the last level. ~$:
Over The Wire - Bandit 1 -> 2
- https://kaliban2056.github.io/posts/overthewire-bandit-1-2/
+ http://localhost:1313/posts/overthewire-bandit-1-2/
Sun, 04 Aug 2024 20:08:05 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-1-2/
+ http://localhost:1313/posts/overthewire-bandit-1-2/Task Read the content of the file called “-”
Login SSH: bandit1@bandit.labs.overthewire.org -p 2220
Password: ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
@@ -81,9 +81,9 @@ Solution We log in to the remote host with the right credentials ~$: ssh bandit1
Over The Wire - Bandit 0 -> 1
- https://kaliban2056.github.io/posts/overthewire-bandit-0-1/
+ http://localhost:1313/posts/overthewire-bandit-0-1/
Sun, 04 Aug 2024 19:51:15 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-0-1/
+ http://localhost:1313/posts/overthewire-bandit-0-1/Task Find the file readme stored in the filesystem.
Login SSH: bandit0@bandit.labs.overthewire.org -p 2220
Password: bandit0
@@ -92,9 +92,9 @@ pwd this command show the name of the working directory, the directory you&r
Over The Wire - Bandit 0
- https://kaliban2056.github.io/posts/overthewire-bandit-0/
+ http://localhost:1313/posts/overthewire-bandit-0/
Sun, 04 Aug 2024 19:47:52 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-0/
+ http://localhost:1313/posts/overthewire-bandit-0/Introduction OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
I worked through the levels and decided to write a walkthrough for my blog.
diff --git a/public/tags/bandit/page/1/index.html b/public/tags/bandit/page/1/index.html
index 365cdff..7437a96 100644
--- a/public/tags/bandit/page/1/index.html
+++ b/public/tags/bandit/page/1/index.html
@@ -1,2 +1,2 @@
-https://kaliban2056.github.io/tags/bandit/
-
\ No newline at end of file
+http://localhost:1313/tags/bandit/
+
\ No newline at end of file
diff --git a/public/tags/bandit/page/2/index.html b/public/tags/bandit/page/2/index.html
index 6846c78..01200c5 100644
--- a/public/tags/bandit/page/2/index.html
+++ b/public/tags/bandit/page/2/index.html
@@ -1,16 +1,16 @@
-Bandit | Kaliban's Blog
-
Task Read the content of the file called “-”
Login SSH: bandit1@bandit.labs.overthewire.org -p 2220
Password: ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
Theory To read a file with an “unconventional name” such as - we need to use the path of the file ./.
-Solution We log in to the remote host with the right credentials ~$: ssh bandit1@bandit.labs.overthewire.org -p 2220 Search for the file and read it. bandit1@bandit~$: ls - bandit1@bandit~$: cat ./- 263JGJPfgU6LtdEvgfWU1XP5yac29mFx We can now proceed to the next challenge....
Over The Wire - Bandit 0 -> 1
Task Find the file readme stored in the filesystem.
+Solution We log in to the remote host with the right credentials ~$: ssh bandit1@bandit.labs.overthewire.org -p 2220 Search for the file and read it. bandit1@bandit~$: ls - bandit1@bandit~$: cat ./- 263JGJPfgU6LtdEvgfWU1XP5yac29mFx We can now proceed to the next challenge....
Over The Wire - Bandit 0 -> 1
Task Find the file readme stored in the filesystem.
Login SSH: bandit0@bandit.labs.overthewire.org -p 2220
Password: bandit0
Theory After loggin in the remote host you can use a set of commands to understand where are you and what files are in your directory:
-pwd this command show the name of the working directory, the directory you’re in right now. ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files....
Over The Wire - Bandit 0
Introduction OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
+pwd this command show the name of the working directory, the directory you’re in right now. ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files....
Over The Wire - Bandit 0
Introduction OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
-I worked through the levels and decided to write a walkthrough for my blog....
Task The password for the next level is stored somewhere on the server and has all of the following properties:
owned by user bandit7 owned by group bandit6 33 bytes in size Login SSH: bandit6@bandit.labs.overthewire.org -p 2220
Password: HWasnPhtq9AVKe0dmk45nxy20cvUa6EG
-Theory
Over The Wire - Bandit 5 -> 6
Task Find the only file that respect these requirements and read its content.
+Theory The process to solve this task is pretty similar to the previous level, we just need the find command with some different attribute, -user [username] searches for files owned by a specific user and -group [groupname] searches for files owned by a specific group....
Over The Wire - Bandit 5 -> 6
Task Find the only file that respect these requirements and read its content.
The requirements are:
human-readable 1033 bytes in size not executable Login SSH: bandit5@bandit.labs.overthewire.org -p 2220
Password: 4oQYVPkxZOOEOO5pTW81FB8j8lxXGUQw
Theory To solve this task, we’ll use a combination of basic Linux commands to search for and identify the file with the specified properties. Let’s break down the key commands we’ll be using:
find Command
-The find command in Linux is a powerful tool that allows users to search for files and directories based on various criteria....
Over The Wire - Bandit 4 -> 5
Task Find the only human-readable file inside the inhere directory.
+The find command in Linux is a powerful tool that allows users to search for files and directories based on various criteria....
Over The Wire - Bandit 4 -> 5
Task Find the only human-readable file inside the inhere directory.
Login SSH: bandit4@bandit.labs.overthewire.org -p 2220
Password: 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
Theory To find what file is human-readable we can check the type of data inside the file. To do that we can use the file command, some examples would be: ASCII text, directory, POSIX tar archive. Trying to read a non human-readable file would show something like this in the output l�����]�a߯-@gQ�÷�wz�P�ߠy�.
-Solution SSH in to the remote host again and go to the inhere directory....
Over The Wire - Bandit 3 -> 4
Task Find and read the content of the hidden file in the inhere directory.
+Solution SSH in to the remote host again and go to the inhere directory....
Over The Wire - Bandit 3 -> 4
Task Find and read the content of the hidden file in the inhere directory.
Login SSH: bandit3@bandit.labs.overthewire.org -p 2220
Password: MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
-Theory To find an hidden file in a linux filesystem is really easy, we can use the ls command to list every file in the directory adding to it the -a attribute to list hidden files too. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities....
Over The Wire - Bandit 2 -> 3
Task Read the content of the file called “spaces in this filename”.
+Theory To find an hidden file in a linux filesystem is really easy, we can use the ls command to list every file in the directory adding to it the -a attribute to list hidden files too. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities....
Over The Wire - Bandit 2 -> 3
Task Read the content of the file called “spaces in this filename”.
Login SSH: bandit2@bandit.labs.overthewire.org -p 2220
Password: 263JGJPfgU6LtdEvgfWU1XP5yac29mFx
Theory We can’t read a file that has a space in its filename normally. To read it we can simply put the name of the file between quotes "filname" and then we can read it.
-Solution Log in to the remote host with the credentials from the last level. ~$: ssh bandit2@bandit....
Task Read the content of the file called “-”
Login SSH: bandit1@bandit.labs.overthewire.org -p 2220
Password: ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
Theory To read a file with an “unconventional name” such as - we need to use the path of the file ./.
-Solution We log in to the remote host with the right credentials ~$: ssh bandit1@bandit.labs.overthewire.org -p 2220 Search for the file and read it. bandit1@bandit~$: ls - bandit1@bandit~$: cat ./- 263JGJPfgU6LtdEvgfWU1XP5yac29mFx We can now proceed to the next challenge....
Over The Wire - Bandit 0 -> 1
Task Find the file readme stored in the filesystem.
+Solution We log in to the remote host with the right credentials ~$: ssh bandit1@bandit.labs.overthewire.org -p 2220 Search for the file and read it. bandit1@bandit~$: ls - bandit1@bandit~$: cat ./- 263JGJPfgU6LtdEvgfWU1XP5yac29mFx We can now proceed to the next challenge....
Over The Wire - Bandit 0 -> 1
Task Find the file readme stored in the filesystem.
Login SSH: bandit0@bandit.labs.overthewire.org -p 2220
Password: bandit0
Theory After loggin in the remote host you can use a set of commands to understand where are you and what files are in your directory:
-pwd this command show the name of the working directory, the directory you’re in right now. ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files....
Over The Wire - Bandit 0
Introduction OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
+pwd this command show the name of the working directory, the directory you’re in right now. ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files....
Over The Wire - Bandit 0
Introduction OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
-I worked through the levels and decided to write a walkthrough for my blog....
Over The Wire - Bandit 5 -> 6
- https://kaliban2056.github.io/posts/overthewire-bandit-5-6/
+ http://localhost:1313/posts/overthewire-bandit-5-6/
Wed, 07 Aug 2024 12:31:20 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-5-6/
+ http://localhost:1313/posts/overthewire-bandit-5-6/Task Find the only file that respect these requirements and read its content.
The requirements are:
human-readable 1033 bytes in size not executable Login SSH: bandit5@bandit.labs.overthewire.org -p 2220
@@ -38,9 +38,9 @@ The find command in Linux is a powerful tool that allows users to search for fil
Over The Wire - Bandit 4 -> 5
- https://kaliban2056.github.io/posts/overthewire-bandit-4-5/
+ http://localhost:1313/posts/overthewire-bandit-4-5/
Wed, 07 Aug 2024 11:50:31 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-4-5/
+ http://localhost:1313/posts/overthewire-bandit-4-5/Task Find the only human-readable file inside the inhere directory.
Login SSH: bandit4@bandit.labs.overthewire.org -p 2220
Password: 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
@@ -49,9 +49,9 @@ Solution SSH in to the remote host again and go to the inhere directory.
Over The Wire - Bandit 3 -> 4
- https://kaliban2056.github.io/posts/overthewire-bandit-3-4/
+ http://localhost:1313/posts/overthewire-bandit-3-4/
Wed, 07 Aug 2024 11:40:36 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-3-4/
+ http://localhost:1313/posts/overthewire-bandit-3-4/Task Find and read the content of the hidden file in the inhere directory.
Login SSH: bandit3@bandit.labs.overthewire.org -p 2220
Password: MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
@@ -59,9 +59,9 @@ Theory To find an hidden file in a linux filesystem is really easy, we can use t
Over The Wire - Bandit 2 -> 3
- https://kaliban2056.github.io/posts/overthewire-bandit-2-3/
+ http://localhost:1313/posts/overthewire-bandit-2-3/
Tue, 06 Aug 2024 17:51:53 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-2-3/
+ http://localhost:1313/posts/overthewire-bandit-2-3/Task Read the content of the file called “spaces in this filename”.
Login SSH: bandit2@bandit.labs.overthewire.org -p 2220
Password: 263JGJPfgU6LtdEvgfWU1XP5yac29mFx
@@ -70,9 +70,9 @@ Solution Log in to the remote host with the credentials from the last level. ~$:
Over The Wire - Bandit 1 -> 2
- https://kaliban2056.github.io/posts/overthewire-bandit-1-2/
+ http://localhost:1313/posts/overthewire-bandit-1-2/
Sun, 04 Aug 2024 20:08:05 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-1-2/
+ http://localhost:1313/posts/overthewire-bandit-1-2/Task Read the content of the file called “-”
Login SSH: bandit1@bandit.labs.overthewire.org -p 2220
Password: ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
@@ -81,9 +81,9 @@ Solution We log in to the remote host with the right credentials ~$: ssh bandit1
Over The Wire - Bandit 0 -> 1
- https://kaliban2056.github.io/posts/overthewire-bandit-0-1/
+ http://localhost:1313/posts/overthewire-bandit-0-1/
Sun, 04 Aug 2024 19:51:15 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-0-1/
+ http://localhost:1313/posts/overthewire-bandit-0-1/Task Find the file readme stored in the filesystem.
Login SSH: bandit0@bandit.labs.overthewire.org -p 2220
Password: bandit0
@@ -92,9 +92,9 @@ pwd this command show the name of the working directory, the directory you&r
Over The Wire - Bandit 0
- https://kaliban2056.github.io/posts/overthewire-bandit-0/
+ http://localhost:1313/posts/overthewire-bandit-0/
Sun, 04 Aug 2024 19:47:52 +0200
- https://kaliban2056.github.io/posts/overthewire-bandit-0/
+ http://localhost:1313/posts/overthewire-bandit-0/Introduction OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
I worked through the levels and decided to write a walkthrough for my blog.
diff --git a/public/tags/over-the-wire/page/1/index.html b/public/tags/over-the-wire/page/1/index.html
index cfb1dea..273b7e0 100644
--- a/public/tags/over-the-wire/page/1/index.html
+++ b/public/tags/over-the-wire/page/1/index.html
@@ -1,2 +1,2 @@
-https://kaliban2056.github.io/tags/over-the-wire/
-
\ No newline at end of file
+http://localhost:1313/tags/over-the-wire/
+
\ No newline at end of file
diff --git a/public/tags/over-the-wire/page/2/index.html b/public/tags/over-the-wire/page/2/index.html
index c385e0f..f253480 100644
--- a/public/tags/over-the-wire/page/2/index.html
+++ b/public/tags/over-the-wire/page/2/index.html
@@ -1,16 +1,16 @@
-Over the Wire | Kaliban's Blog
-
Task Read the content of the file called “-”
Login SSH: bandit1@bandit.labs.overthewire.org -p 2220
Password: ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
Theory To read a file with an “unconventional name” such as - we need to use the path of the file ./.
-Solution We log in to the remote host with the right credentials ~$: ssh bandit1@bandit.labs.overthewire.org -p 2220 Search for the file and read it. bandit1@bandit~$: ls - bandit1@bandit~$: cat ./- 263JGJPfgU6LtdEvgfWU1XP5yac29mFx We can now proceed to the next challenge....
Over The Wire - Bandit 0 -> 1
Task Find the file readme stored in the filesystem.
+Solution We log in to the remote host with the right credentials ~$: ssh bandit1@bandit.labs.overthewire.org -p 2220 Search for the file and read it. bandit1@bandit~$: ls - bandit1@bandit~$: cat ./- 263JGJPfgU6LtdEvgfWU1XP5yac29mFx We can now proceed to the next challenge....
Over The Wire - Bandit 0 -> 1
Task Find the file readme stored in the filesystem.
Login SSH: bandit0@bandit.labs.overthewire.org -p 2220
Password: bandit0
Theory After loggin in the remote host you can use a set of commands to understand where are you and what files are in your directory:
-pwd this command show the name of the working directory, the directory you’re in right now. ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files....
Over The Wire - Bandit 0
Introduction OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
+pwd this command show the name of the working directory, the directory you’re in right now. ls list the files in the current folder, you can add the attribute -a to show hidden files, using -l instead will show additional information on the files....
Over The Wire - Bandit 0
Introduction OverTheWire is a free online platform “to learn and practice security concepts in the form of fun-filled games”. It has different, so-called “Wargames”, that deal each deal with an area of security.
The first game that is recommended is called Bandit. It is recommended first because it teaches “the basics needed to be able to play other wargames”. This includes mainly basic Linux and Git commands.
-I worked through the levels and decided to write a walkthrough for my blog....