πŸ•ΈοΈ
Th4ntis CyberSec
  • πŸ•·οΈ>whoami_
  • πŸ–₯️General Info
    • CyberSec News
    • Getting Started and other Resources
      • CompTIA Certs
        • Security+
        • Pentest+
    • MITRE ATT&CK
    • Cyber Kill Chain
    • Docker
  • πŸ’»Networking
    • General Networking
    • Common Ports and Protocols
    • TCP/IP Model
    • OSI Model
    • Subnetting
    • Wireshark
    • NMap
    • Wireless
      • Wardriving/WiFi Sniffing
    • 3-Way Handshake
  • 🐧Linux
    • Common commands
    • Sudo
    • Files and File contents
    • Sed Awk and Grep
    • Permissions
  • πŸͺŸWindows
    • Event Codes
    • Powershell
    • Internals
    • Active Directory
  • πŸ”ŽOSINT
    • OSINT Tools
    • IP/Domain OSINT
    • Email/Username OSINT
    • URL OSINT and Sandboxing
    • Social Media OSINT
    • Website OSINT
    • Password OSINT
    • Physical Location OSINT
    • Image OSINT
    • People OSINT
    • Phone Number OSINT
    • Shodan
    • Google Dorking
  • πŸ› οΈTools
    • Brute Force
      • Hydra
    • Credential Dumping
      • Mimikatz
    • Enumeration
      • Bloodhound
      • Certipy
      • Dirb/Dirbuster
      • Enum4Linux
      • GoBuster
    • Exploitation Framework
      • Metasploit
      • Sliver
      • Cobalt Strike
    • Hash Cracking
      • Hashcat
      • JohnTheRipper
    • Methods
      • Powershell Obfuscation
      • Privilege Escalation
      • Pass-The-Hash
      • Kerberos and Kerberoasting
    • Vulnerability Scanners
      • Nessus
      • OpenVAS
    • Web App
      • BurpSuite
      • OWASP Zap
    • Wireless
      • Aircrack-ng
      • Kismet
      • Bettercap
      • HCXDumptool
      • Wifite
    • Impacket
    • Social-Engineer Toolkit (SET)
  • πŸ“”Guides and How-To's
    • Lab Setup
      • Ubuntu VM
      • Kali VM
      • Windows User VM
      • Windows Server VM
    • Wardriving
      • Pwnagotchi
    • Wireless Pentesting
      • WiFi Pineapple Basics
      • Evil-Twin Attack
    • Over The Wire
      • Bandit
      • Natas
      • Leviathan
      • Krypton
      • Narnia
      • Behemoth
      • Utumno
      • Maze
      • Vortex
      • Manpage
    • Docker and Kali Linux
    • Staying Private and goin Dark Online
  • πŸ“•Quick References
    • Tools
      • Tmux
      • NMap
      • Ffuf
      • NetExec
      • CrackMapExec
      • Proxychains
      • OneDriveUser Enum
      • Hashcat
    • One-liners
    • Reverse Shells
    • Post Exploitation
    • Enumeration
      • Google
      • Sublist3r
      • NMap
      • DNSDumpster
    • Hashcracking
    • Wireless
  • πŸ““Courses
    • PNPT
      • Practical Ethical Hacking
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • OSINT Fundamentals
      • External Pentest Playbook
  • ☁️TryHackMe
    • Attacking Kerberos
    • Hacking with Powershell
    • Powershell for Pentesters
    • Linux PrivEsc
    • Windows PrivEsc
    • Blue
    • Kenobi
  • πŸ“¦HackTheBox
    • Starting Point
      • Tier 0
        • Meow
        • Fawn
        • Dancing
        • Redeemer
        • Explosion
        • Preignition
        • Mongod
        • Synced
      • Tier 1
        • Appointment
        • Sequel
        • Crocodile
        • Responder
        • Three
        • Ignition
        • Bike
        • Funnel
        • Pennyworth
        • Tactics
      • Tier 2
        • Archetype
        • Oopsie
        • Vaccine
        • Unified
        • Included
        • Markup
        • Base
    • Walkthroughs
      • Lame
      • Analytics
      • Manager
      • Codify
Powered by GitBook
On this page
  • Starting out
  • Level 0
  • Level 1
  • Level 2
  • Level 3
  • Level 4
  • Level 5
  • Level 6
  • Level 7
  • Level 8
  • Level 9
  • Level 10
  • Level 11
  • Level 12
  • Level 13
  • Level 14
  • Level 15
  • Level 16
  • Level 17
  • Level 18
  • Level 19
  • Level 20
  • Level 21
  • Level 22
  • Level 23
  • Level 24
  • Level 25
  • Level 26
  • Level 27
  • Level 28
  • Level 29
  • Level 30
  • Level 31
  • Level 32
  • Level 33
  • Level 34
Edit on GitHub
  1. Guides and How-To's
  2. Over The Wire

Bandit

Last updated 2 years ago

. This game is aimed at absolute beginners. It teaches the basics needed to be able to play the other games.

Starting out

Level 0 has us SSH into to log in. We can use ssh bandit.labs.overthewire.org -p 2220 -l bandit0 with the password of bandit0, as they provide the uername and password.

Level 0

Now that we're in, we need to log in using user bandit1 now, the password is located in a file called readme in the home directory. So lets use ls to verify the file is there with ls, and cat the file to see it's contents.

Now we can log into level 2 with ssh bandit.labs.overthewire.org -p 2220 -l bandit1 with the new password NH2SXQwcBdpmTEzi3bvBHMM9H66vVXjL

Level 1

The password to get to level 2 is found in file - located in the home directory.

Now with this, we can't just cat the file as it starts with(is) special character, so we need to use cat ./(character) like this: cat ./-. Now we get our next password, which is rRGizSaX8Mk1RTb1CNQoXTcYZWU6lgzi.

Level 2

We can log into Level 2 with ssh bandit.labs.overthewire.org -p 2220 -l bandit2 using the password we obtained from level 1, rRGizSaX8Mk1RTb1CNQoXTcYZWU6lgzi.

For this game, the password for the next level is located in a file called spaces in this filename located in the home directory.

To cat a file with spaces in the name, we need to "breakout" using the bacspace (\) character at the and of each word.

We can now see the password is aBZ0W5EmUfAf7kHTQeOwd8bauFJ2lAiG.

Level 3

From this point on, SSHing into the new machine pics won't be posted. We can log into Level 3 with ssh bandit.labs.overthewire.org -p 2220 -l bandit3 and using the password from the previous session, aBZ0W5EmUfAf7kHTQeOwd8bauFJ2lAiG.

The password for the next level is in a hidden file in the inhere directory. Hidden files in linux are started with a perdio (.) so looking in the inhere directory, we see nothing, but using ls -al we can see all the files, including hidden, in that directory. So we can cat that file to obtain the password 2EW7BBsr6aMMoJ2HjW067dm8EgX26xNe.

Level 4

Log into Level 4 with ssh bandit.labs.overthewire.org -p 2220 -l bandit4 and using the password from the previous session, 2EW7BBsr6aMMoJ2HjW067dm8EgX26xNe.

This level, the password is in the only 'human-readable' file in the inhere directory.

We can see the what they mean by human-readable. So, we can cat each file individually but, theres another way using the file command. We can run file ./* to identify each file type.

We see -file07 is ASCII text. So now we can cat the file to see it's contents.

We can see the password is lrIWWI6bB37kxfiCQZqUdOIYfr6eEeqR.

Level 5

Log into Level 5 with ssh bandit.labs.overthewire.org -p 2220 -l bandit5 and using the password from the previous session, lrIWWI6bB37kxfiCQZqUdOIYfr6eEeqR.

Level 6

Level 7

Level 8

Level 9

Level 10

Level 11

Level 12

Level 13

Level 14

Level 15

Level 16

Level 17

Level 18

Level 19

Level 20

Level 21

Level 22

Level 23

Level 24

Level 25

Level 26

Level 27

Level 28

Level 29

Level 30

Level 31

Level 32

Level 33

Level 34

πŸ“”
Bandit