Technical Notes
OverTheWire Bandit: Level 33 → Level 34 (Finale)
Mission Accomplished! We have reached the end of the Bandit wargame series.
OverTheWire Bandit: Level 32 → Level 33
Uppshell Escape: How to break out of a restricted shell that converts everything to uppercase.
OverTheWire Bandit: Level 31 → Level 32
Git Push & .gitignore: How to force ignored files into the repository to trigger a server-side action.
OverTheWire Bandit: Level 30 → Level 31
Git Tags: Using tags to inspect specific points in a repository's history.
OverTheWire Bandit: Level 29 → Level 30
Git Branches: Exploring parallel development lines to find hidden secrets.
OverTheWire Bandit: Level 28 → Level 29
Git History: How to recover lost data by exploring the commit log.
OverTheWire Bandit: Level 27 → Level 28
Git Basics: How to clone a repository and retrieve data from a version control system.
OverTheWire Bandit: Level 26 → Level 27
Enumeration and SUID: How to solve a level that gives no instructions by exploring the environment.
OverTheWire Bandit: Level 25 → Level 26
Restricted Shell Escape: How to break out of jail using 'more' and 'vi' by simply resizing the terminal.
OverTheWire Bandit: Level 24 → Level 25
Breaking a 4-digit PIN with a Brute-Force attack. Trying 10,000 combinations in seconds.
OverTheWire Bandit: Level 23 → Level 24
Beyond Script Kiddie: Writing our first shell script to force a privileged user to execute our commands.
OverTheWire Bandit: Level 22 → Level 23
Code Literacy: Analyzing shell scripts to predict dynamically generated filenames.
OverTheWire Bandit: Level 21 → Level 22
Time Lord Cron: Analyzing scheduled tasks (cronjobs) to find and inspect background scripts.
OverTheWire Bandit: Level 20 → Level 21
Role Reversal: Setting up our own listener to catch a connection from a privileged SUID binary.
OverTheWire Bandit: Level 19 → Level 20
Super Powers (SUID): Leveraging setuid binaries to execute commands with another user's privileges.
OverTheWire Bandit: Level 18 → Level 19
Shell Escape: Bypassing a restricted shell (immediate logout) by executing commands directly via SSH.
OverTheWire Bandit: Level 17 → Level 18
Spot the Difference: Using the diff command to find the single altered line between two files.
OverTheWire Bandit: Level 16 → Level 17
Detective Work: Scanning ports with Nmap, identifying SSL services, and capturing a private SSH key.
OverTheWire Bandit: Level 15 → Level 16
Secure Connection (SSL/TLS): Using OpenSSL to communicate with an encrypted service on port 30001.
OverTheWire Bandit: Level 14 → Level 15
Intro to Networking: Using Netcat (nc) to send data to a local port and retrieve a response.
OverTheWire Bandit: Level 13 → Level 14
Keys instead of Passwords: Authentication using an SSH Private Key and connecting to localhost.
OverTheWire Bandit: Level 12 → Level 13
The Matryoshka Cipher: Peeling back layers of repeated compression (xxd, gzip, bzip2, tar).
OverTheWire Bandit: Level 11 → Level 12
Caesar Cipher and ROT13. Shifting letters to encrypt, and using the tr (translate) command to decode.
OverTheWire Bandit: Level 10 → Level 11
What is Base64? It is NOT Encryption! Decoding the messy text inside data.txt using base64 -d.
OverTheWire Bandit: Level 9 → Level 10
Reading text inside binary files: Using the strings command to extract 'human-readable' data from the chaos.
OverTheWire Bandit: Level 8 → Level 9
The power of Linux: Chaining commands with the Pipe (|) operator. Using Sort and Uniq to find the unique needle in a haystack of duplicates.
OverTheWire Bandit: Level 7 → Level 8
Still searching for needles: Searching for text inside large files using the grep command.
OverTheWire Bandit: Level 6 → Level 7
Scanning the entire system: Using find to search by user/group ownership and suppressing error messages (stderr).
OverTheWire Bandit: Level 5 → Level 6
Finding a needle in a haystack: Using the find command to filter files by size, type, and permissions to locate the password.
OverTheWire Bandit: Level 4 → Level 5
Understanding file types in Linux: The 'file' command and human-readable files. Finding the needle in the data haystack.
OverTheWire Bandit: Level 3 → Level 4
Understanding Linux hidden files (dotfiles) and using 'ls' command parameters.
OverTheWire Bandit: Level 2 → Level 3
Managing filenames with spaces in the Linux shell and understanding the concept of 'escaping'.
OverTheWire Bandit: Level 1 → Level 2
Handling special characters in filenames and understanding Standard Input/Output (STDIN/STDOUT) in Linux.
OverTheWire Bandit: Level 0 → Level 1
Linux filesystem navigation, file type analysis, and secure data reading methods.
OverTheWire Bandit: Level 0 - SSH Fundamentals
Understanding SSH behavior on non-standard ports and the basics of secure remote server connections.