Technical Notes

OverTheWire Bandit: Level 33 → Level 34 (Finale)

Mission Accomplished! We have reached the end of the Bandit wargame series.

OverTheWire Bandit: Level 32 → Level 33

Uppshell Escape: How to break out of a restricted shell that converts everything to uppercase.

OverTheWire Bandit: Level 31 → Level 32

Git Push & .gitignore: How to force ignored files into the repository to trigger a server-side action.

OverTheWire Bandit: Level 30 → Level 31

Git Tags: Using tags to inspect specific points in a repository's history.

OverTheWire Bandit: Level 29 → Level 30

Git Branches: Exploring parallel development lines to find hidden secrets.

OverTheWire Bandit: Level 28 → Level 29

Git History: How to recover lost data by exploring the commit log.

OverTheWire Bandit: Level 27 → Level 28

Git Basics: How to clone a repository and retrieve data from a version control system.

OverTheWire Bandit: Level 26 → Level 27

Enumeration and SUID: How to solve a level that gives no instructions by exploring the environment.

OverTheWire Bandit: Level 25 → Level 26

Restricted Shell Escape: How to break out of jail using 'more' and 'vi' by simply resizing the terminal.

OverTheWire Bandit: Level 24 → Level 25

Breaking a 4-digit PIN with a Brute-Force attack. Trying 10,000 combinations in seconds.

OverTheWire Bandit: Level 23 → Level 24

Beyond Script Kiddie: Writing our first shell script to force a privileged user to execute our commands.

OverTheWire Bandit: Level 22 → Level 23

Code Literacy: Analyzing shell scripts to predict dynamically generated filenames.

OverTheWire Bandit: Level 21 → Level 22

Time Lord Cron: Analyzing scheduled tasks (cronjobs) to find and inspect background scripts.

OverTheWire Bandit: Level 20 → Level 21

Role Reversal: Setting up our own listener to catch a connection from a privileged SUID binary.

OverTheWire Bandit: Level 19 → Level 20

Super Powers (SUID): Leveraging setuid binaries to execute commands with another user's privileges.

OverTheWire Bandit: Level 18 → Level 19

Shell Escape: Bypassing a restricted shell (immediate logout) by executing commands directly via SSH.

OverTheWire Bandit: Level 17 → Level 18

Spot the Difference: Using the diff command to find the single altered line between two files.

OverTheWire Bandit: Level 16 → Level 17

Detective Work: Scanning ports with Nmap, identifying SSL services, and capturing a private SSH key.

OverTheWire Bandit: Level 15 → Level 16

Secure Connection (SSL/TLS): Using OpenSSL to communicate with an encrypted service on port 30001.

OverTheWire Bandit: Level 14 → Level 15

Intro to Networking: Using Netcat (nc) to send data to a local port and retrieve a response.

OverTheWire Bandit: Level 13 → Level 14

Keys instead of Passwords: Authentication using an SSH Private Key and connecting to localhost.

OverTheWire Bandit: Level 12 → Level 13

The Matryoshka Cipher: Peeling back layers of repeated compression (xxd, gzip, bzip2, tar).

OverTheWire Bandit: Level 11 → Level 12

Caesar Cipher and ROT13. Shifting letters to encrypt, and using the tr (translate) command to decode.

OverTheWire Bandit: Level 10 → Level 11

What is Base64? It is NOT Encryption! Decoding the messy text inside data.txt using base64 -d.

OverTheWire Bandit: Level 9 → Level 10

Reading text inside binary files: Using the strings command to extract 'human-readable' data from the chaos.

OverTheWire Bandit: Level 8 → Level 9

The power of Linux: Chaining commands with the Pipe (|) operator. Using Sort and Uniq to find the unique needle in a haystack of duplicates.

OverTheWire Bandit: Level 7 → Level 8

Still searching for needles: Searching for text inside large files using the grep command.

OverTheWire Bandit: Level 6 → Level 7

Scanning the entire system: Using find to search by user/group ownership and suppressing error messages (stderr).

OverTheWire Bandit: Level 5 → Level 6

Finding a needle in a haystack: Using the find command to filter files by size, type, and permissions to locate the password.

OverTheWire Bandit: Level 4 → Level 5

Understanding file types in Linux: The 'file' command and human-readable files. Finding the needle in the data haystack.

OverTheWire Bandit: Level 3 → Level 4

Understanding Linux hidden files (dotfiles) and using 'ls' command parameters.

OverTheWire Bandit: Level 2 → Level 3

Managing filenames with spaces in the Linux shell and understanding the concept of 'escaping'.

OverTheWire Bandit: Level 1 → Level 2

Handling special characters in filenames and understanding Standard Input/Output (STDIN/STDOUT) in Linux.

OverTheWire Bandit: Level 0 → Level 1

Linux filesystem navigation, file type analysis, and secure data reading methods.

OverTheWire Bandit: Level 0 - SSH Fundamentals

Understanding SSH behavior on non-standard ports and the basics of secure remote server connections.