As a beginner in cybersecurity, I started playing OverTheWire: Bandit to practice everything I’ve learned.
I needed to look up some information, so I think you might be interested in knowing how to overcome OverTheWire levels 0-6 if you’re just starting in cybersecurity.
Level 0:
Objective: Connect to the server using the provided credentials.
How to do it:
Open a terminal and connect via SSH using the login credentials (bandit0 and the password provided on the OverTheWire site).
Example: ssh bandit0@bandit.labs.overthewire.org -p 2220
Level 1:
Objective: Find the password for bandit1.
How to do it:
Once logged in with the bandit0 account, use the ls
command to list the files. You will find a file called readme
.
Use cat readme
to view the content, which will be the password for the next level.
Level 2:
Objective: Find the password for bandit2 using a tool called find.
How to do it:
Use find
to search for files with names containing the word “password”.
Example: find / -name "password*" 2>/dev/null
Once you find the file with the password, use cat
to read it.
Level 3:
Objective: The password for bandit3 is in a compressed file.
How to do it:
Search for compressed files (e.g., .gz) and use file
to determine the type of the file.
Decompress with gzip -d <filename>
or tar -xvzf <filename>
.
Read the content of the file to find the password.
Level 4:
Objective: Find the password for bandit4 in a binary file.
How to do it:
Use file
to confirm that the file is not plain text.
Use tools like strings
to extract readable text from the binary.
Example: strings <filename> | grep -i password
Level 5:
Objective: The password for bandit5 is in a file with restricted permissions.
How to do it:
Use the ls -l
command to view the file’s permissions.
Use chmod
to change the permissions if necessary or sudo
to gain access.
Look for how to obtain the password from the file.
Level 6:
Objective: The file containing the password is encrypted.
How to do it:
Use tools like gpg
to decrypt the file if it’s encrypted.
Command to decrypt: gpg -d <file>
.
If you’re asked for a password to decrypt, try the provided key.
Each level has its own challenge, but generally, it involves using basic Linux commands, redirecting output, manipulating files, and understanding permissions. Don’t hesitate to research more about how tools like find
, strings
, gpg
, cat
, chmod
, and others are used in each level.
If you need more details on a specific level, feel free to let me know.
Good luck with the game!