Skip to content
Go back

Bandit - OTW

Updated:  at  02:55 PM

OverTheWire - Bandit Challenges

To connect use

ssh bandit-level-@bandit.labs.overthewire.org -p 2220

Bandit 0

Command:

ssh bandit0@bandit.labs.overthewire.org -p 2220

Explanation:

Password: Achived

Bandit 0➔1

Steps:

ls
cat readme

Explanation:

Password: Achived


Bandit 1➔2

Steps:

ls -la
cat < -

or use cat ./-

Explanation:

Password: Achived


Bandit 2➔3

Steps:

ls
cat spaces\ in\ this\ filename

Explanation:

Password: Achived


Bandit 3➔4

Steps:

ls
cd inhere
ls -llah
cat .hidden-file-name

Explanation:

Password: Achived


Bandit 4➔5

Steps:

cd inhere
ls -llah
cat ~/inhere/-file07

Explanation:

Password: Achived


Bandit 5➔6

Steps:

find ~/inhere -type f -size 1033c -print

Explanation:

Password: Achived


Bandit 6➔7

Steps:

find / -user bandit7 -group bandit6 -size 33c 2>/dev/null
or 
find / -user bandit7 -group bandit6 -size 33c -print

Explanation:

Password: Achived


Bandit 7➔8

grep -r millionth .

Explanation:

Password: Achived


Bandit 8➔9

sort Data.txt | uniq -c | sort -nr

Explanation:

Password: Achived


Bandit 9➔10

Steps:

ls -llah
grep -a ==== data.txt

Explanation:

Password: Achived


Bandit 10➔11

Steps:

strings data.txt
strings data.txt | base64 -d

Explanation:

Password: Achived


Bandit 11➔12

file data.txt => ASCII TEXT
strings data.txt

Then using rot13.com to get the flag.

Explanation:

Password: Achived


Bandit 12➔13

mktemp -d => `/tmp/tmp.4C3plgulef`
cd /tmp/tmp.4C3plgulef
cp ~/data.txt ./bot.txt
mv bot.txt data.txt

xxd -r data.txt data1.txt
file data1.txt => `gzip`

cp data1.txt data2.gz
gzip -d data2.gz => `data2`

file data2 => `bzip2`
cp data2 data3.bz2 && ls

bzip2 -d bata3.bz2 => `data3`
file data3 => `gzip`\

cp data3 4data.gz
gzip -d 4data.gz => `4data`
file 4data => `tar`

xxd 4data | head -50
cp 4data 5data.tar

tar -xf 5data.tar => data5.bin
ls -llah
file data5.bin => `tar`

xxd data5.bin | head -50
cp data5.bin 6data.tar
tar -xf 6data.tar => `data6.bin`
ls -llah
file data6.bin => `bzip2`

cp data6.bin 7data.bz2
bzip2 -d 7data.bz2 => 7data
file 7data => `tar`

cp 7data 8data.tar
tar -xf 8data.tar => data8.bin
ls -llah
file data8.bin => `Gzip`
cp data8.bin 9data.gz

gzip -d 9data.gz => 9data
ls && file 9data => `ASCII` `TEXT`

cp 9data final_password

strings final_password

Password: Achived


Bandit 13➔14

After logging in

cat /ect/bandit_pass/bandit14 => `permission_denied`
ls -llah => `SSHkey.private`

ssh -i sshkey.private bandit14.localhost -p 2220


@bandit14~> cat /ect/bandit_pass/bandit14

Password: Achived

Bandit 14➔15

nc localhost 30000

Explanation:

Password: Achived


Bandit 15➔16

Steps:

openssl s_client -connect localhost:30001

OR

ncat -ssl localhost 30001

Explanation:

Password: Achived


Bandit 16➔17

nmap localhost -p 31000-32000

Gave 5 open ports

-31046
-31518
-31691
-31790
-31960

Out of which

-31790
-31518

Gave the Private key

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
mktemp -d
cd /tmp/tmp.NA9YDpZ0Mz
vim private.key <= `paste_the_private_key`

and the give the key by

ssh -i private.key bandit17@bandit.labs.overthewire.org -p 2220

To get the password.

All The Passwords-

Bandit 0 - Bandit0
Bandit 0->1 - ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
Bandit 1->2 - 263JGJPfgU6LtdEvgfWU1XP5yac29mFx
Bandit 2->3 - MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
Bandit 3->4 - 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
Bandit 4->5 - 4oQYVPkxZOOEOO5pTW81FB8j8lxXGUQw
Bandit 5->6 - HWasnPhtq9AVKe0dmk45nxy20cvUa6EG
Bandit 6->7 - morbNTDkSW6jIlUc0ymOdMaLnOlFVAaj
Bandit 7->8 - dfwvzFQi4mU0wfNbFOe9RoWskMLg7eEc
Bandit 8->9 - 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM
Bandit 9->10 - FGUW5ilLVJrxX9kMYMmlN4MgbpfMiqey
Bandit 10->11 - dtR173fZKb0RRsDFSGsg2RWnpNVj3qRr
Bandit 11->12 - 7x16WNeHIi5YkIhWsfFIqoognUTyj9Q4i
Bandit 12->13 - FO5dwFsc0cbaIiH0h8J2eUks2vdTDwAn
Bandit 13->14 - MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS
Bandit 14->15 - 8xCjnmgoKbGLhHFAZlGE5Tmu4M2tKJQo
Bandit 15->16 - kSkvUpMQ7lBYyCM4GBPvCvT1BfWRy0Dx
Bandit 16->17 - 

Suggest Changes

Previous Post
Memories Bring Back You
Next Post
Self Destruct