Bandit
Bandit Level 0
ssh -p2220 bandit0@bandit.labs.overthewire.org
password of bandit0 - bandit0
Bandit Level 0 - Level 1
$ ssh -p2220 bandit0@bandit.labs.overthewire.org
bandit0@bandit:~$ cat /home/bandit0/readme
bandit0@bandit:~$ cat /home/bandit0/readme
Congratulations on your first steps into the bandit game!!
Please make sure you have read the rules at https://overthewire.org/rules/
If you are following a course, workshop, walkthrough or other educational activity,
please inform the instructor about the rules as well and encourage them to
contribute to the OverTheWire community so we can keep these games free!
The password you are looking for is: ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
password of bandit1 - ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
Bandit Level 1 - Level 2
$ ssh -p2220 bandit1@bandit.labs.overthewire.org
bandit1@bandit:~$ cat /home/bandit1/-
bandit1@bandit:~$ cat /home/bandit1/-
263JGJPfgU6LtdEvgfWU1XP5yac29mFx
bandit1@bandit:~$ cat ./-
bandit1@bandit:~$ pwd
/home/bandit1
bandit1@bandit:~$ cat ./-
263JGJPfgU6LtdEvgfWU1XP5yac29mFx
password of bandit2 - 263JGJPfgU6LtdEvgfWU1XP5yac29mFx
Bandit Level 2 - Level 3
$ ssh -p2220 bandit2@bandit.labs.overthewire.org
bandit2@bandit:~$ cat "spaces in this filename"
bandit2@bandit:~$ pwd
/home/bandit2
bandit2@bandit:~$ cat "spaces in this filename"
MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
password of bandit3 - MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
Bandit Level 3 - Level 4
$ ssh -p2220 bandit3@bandit.labs.overthewire.org
bandit3@bandit:~$ cat ./inhere/...Hiding-From-You
bandit3@bandit:~$ pwd
/home/bandit3
bandit3@bandit:~$ ls -la
total 24
drwxr-xr-x 3 root root 4096 Sep 19 2024 .
drwxr-xr-x 70 root root 4096 Sep 19 2024 ..
-rw-r--r-- 1 root root 220 Mar 31 2024 .bash_logout
-rw-r--r-- 1 root root 3771 Mar 31 2024 .bashrc
drwxr-xr-x 2 root root 4096 Sep 19 2024 inhere
-rw-r--r-- 1 root root 807 Mar 31 2024 .profile
bandit3@bandit:~$ ls -la inhere/
total 12
drwxr-xr-x 2 root root 4096 Sep 19 2024 .
drwxr-xr-x 3 root root 4096 Sep 19 2024 ..
-rw-r----- 1 bandit4 bandit3 33 Sep 19 2024 ...Hiding-From-You
bandit3@bandit:~$ cat ./inhere/...Hiding-From-You
2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
password of bandit4 - 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
Bandit Level 4 - Level 5
$ ssh -p2220 bandit4@bandit.labs.overthewire.org
bandit4@bandit:~$ find ./inhere/ -type f -exec file {} +
bandit4@bandit:~$ find ./inhere/ -type f -exec file {} +
./inhere/-file08: data
./inhere/-file02: data
./inhere/-file09: data
./inhere/-file01: data
./inhere/-file00: data
./inhere/-file05: data
./inhere/-file07: ASCII text
./inhere/-file03: data
./inhere/-file06: data
./inhere/-file04: data
./inhere/-file07: ASCII text
bandit4@bandit:~$ cat ./inhere/-file07
4oQYVPkxZOOEOO5pTW81FB8j8lxXGUQw
password of bandit5 - 4oQYVPkxZOOEOO5pTW81FB8j8lxXGUQw
Bandit Level 5 - Level 6
$ ssh -p2220 bandit5@bandit.labs.overthewire.org
bandit5@bandit:~$ find ./ -type f -size 1033c -not -executable
bandit5@bandit:~$ find ./ -type f -size 1033c -not -executable
./inhere/maybehere07/.file2
bandit5@bandit:~$ cat ./inhere/maybehere07/.file2
HWasnPhtq9AVKe0dmk45nxy20cvUa6EG
bandit5@bandit:~$
password of bandit6 - HWasnPhtq9AVKe0dmk45nxy20cvUa6EG
Bandit Level 6 - Level 7
$ ssh -p2220 bandit6@bandit.labs.overthewire.org
bandit6@bandit:~$ find / -type f -size 33c -user bandit7 -group bandit6 2>/dev/null
bandit6@bandit:~$ find / -type f -size 33c -user bandit7 -group bandit6 2>/dev/null
/var/lib/dpkg/info/bandit7.password
bandit6@bandit:~$ cat /var/lib/dpkg/info/bandit7.password
morbNTDkSW6jIlUc0ymOdMaLnOlFVAaj
password of bandit7 - morbNTDkSW6jIlUc0ymOdMaLnOlFVAaj
Bandit Level 7 - Level 8
$ ssh -p2220 bandit7@bandit.labs.overthewire.org
bandit7@bandit:~$ cat data.txt | grep millionth
bandit7@bandit:~$ cat data.txt | grep millionth
millionth dfwvzFQi4mU0wfNbFOe9RoWskMLg7eEc
password of bandit8 - dfwvzFQi4mU0wfNbFOe9RoWskMLg7eEc
Bandit Level 8 - Level 9
$ ssh -p2220 bandit8@bandit.labs.overthewire.org
bandit8@bandit:~$ cat data.txt | sort | uniq -c
bandit8@bandit:~$ cat data.txt | sort | uniq -c
10 0BKVRLEJQcpNx8wnSPxDLFnFKlQafKK6
10 0eJPctF8gK96ykGBBaKydhJgxSpTlJtz
10 0kJ7XHD4gVtNSZIpqyP1V45sfz9OBLFo
10 0lPOvKhpHZebxji0gdjtGCd5GWiZnNBj
10 0REUhKk0yMqQOwei6NK9ZqIpE5dVlWWM
10 1jfUH1m4XCjr7eWAeleGdaNSxFXRtX0l
10 1VKPEkd0bCtIRwMFVQfY7InulwOFyDsn
10 2u8fvAzvnaFlvQG3iPt4Wc1TFhPcGxhH
10 35l6mr3f6TvlJyDwU6aUgJX07cLhr6t9
10 3FIgajXBiaQAiTMVGo1gxRDSiACNyvvJ
10 3mNA2le0gfURQKNHVIhGkMNLqLwjyyLN
1 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM
10 4P8FsHcdr7d5WKnPtAaXY5SslKICd2gL
10 5EmwMKZHwF6Lwq5jHUaDlfFJBeHbcX0b
10 5hYz0028e1Q2TrtPVz5GZbpMzZNjebhh
10 5I2jWpqjtVp576xXI2TLh1UCyXJtGQ78
10 6Boy6esAjnIxCYn8uI6KZ7VD7zysDM8i
10 7cP8ssLElERHXqOJc9T84bxsmJBjNXk2
10 7qHmEo1FEbzthgyNpKc38YofXjYKZv18
10 8FCtUQlFXsJnNeyiDY5KfE3vRy6sZFEJ
10 8pePxslMzXqA2mi87wFjxd44qDRdrPiW
10 9jfKbKGp40LjMuiiH9cce4bUo9y8nd0j
10 9PqZLdu143n5djN9mL1MCamrmHERuV7k
10 9Tar2wcD3Urge6s2yp18CAE8zX1poUwV
10 A4MixXbxP5t0RE87qkmAdwwPJO3Aw6rO
10 aFStfHbnQdPWqyRHEzhqe91Wch4O8xHJ
10 aMKlTMrptUxxTypCHocCTrqYRkR2gT8h
10 AOz67fZdaabu2QQyatGXK1dXNUIuyuOD
10 BIAd2jxKMFmitEvp0WmsM0oDAwj4WSUa
10 BmwX4bYhJXyImwt4AVHr7wFyLYCn4IIs
10 BooZo7QXA1Tft7d6zbVkgJiGoJzuBTXS
10 ByBO7V0FaYWN1cqIFbNss21xmjf9VNBP
10 CgUjZiluCoMEvzNAge1Nbv3g9tpLQQj2
10 CgvfWFmg5yxx12D2SZvjzaakG0JIyg7B
10 cOk5XehQn4Uoz1z255BqS8y74pthqBeC
10 dPk8jhZUckmUiDsn4fXE28LpV5VTvev7
10 DShzsMw0ejGwWSFIlvAybLwBLKX6qVfF
10 EgKFNgP4k1pMfGdrWRSiDIvSlAC0Tr42
10 EtevhzigGTVT4NbybBWK5DNXnPt2D5AM
10 fmt1Bzwt8Yw0t0cBVine7zuwyS76iJ7N
10 fSbQqHX7C5Er4WmMSlQ9jkl05sXYQgJU
10 ft7OpREehafXGOiX8EtyzEqXU8f3KRug
10 GCaJbpW4K28ukFR84YhZFY6e7MvAOwpX
10 GW8cRcKbnz53MAPYECx99O0T8POlPIFk
10 hevU1VzF39ZyhyYkCBgmVrY6DbiRt2t5
10 HloFLs5IpuFLuVJugBxKEipr5QaObJMk
10 iGmmKP7APsDfPxrZjCL7eDpGEWR3ot3q
10 IkJadTScIdBQY9a4KVjBEHyXKubCxSlx
10 JaFwKSH0hiff1XRuxVYCzjjtibV9P3zF
10 JQx6RCcNbAesB2lehrUl821WnJPI5gHW
10 K8GxBwF1vxLQB5PaqlcCGfRniemRScj4
10 kgf5CWCm26sycUzaAJRP7e6hYKVwu7Y4
10 KhRNo5JlbDhxbBqCGIokXqBm54v7Wunm
10 KqpxKPY3yIDdEVewIwuetpV0WvGIsN5U
10 KZJOZECxhLxDhxDbGzdNy8m0uplzvP11
10 L2iewY0lmIRR6arfrwWA3VhttgbJ0NIn
10 mMD5Z4y1rRh07rmVRw2HfgcMegbKH0c0
10 mUNISmDjtb3h6xAt3wGRVTY9U0r2u9bR
10 noa4sUvodI8D733ugvy2OAlttHdjMPWJ
10 o44oO4jbyPqoQQYX16586yC7Os2uz3ks
10 omBfcRI91Zm06GI0RLngq05AMwe8Ndqo
10 PHE4soLmy3nZfNOlX3jB8LYKYZRXuTah
10 pij5cPffIOml4tkDCOwo7M2zyxImYJWm
10 PLsGPuNgYzI8YNu2Y7h4D4vz1nHPSuNl
10 pngaDVKjQWnWHOOUze15L3QpwqKme5M9
10 PRerp5EfTVxJHKuCZDXfAfRyCQSdPjMi
10 prq3SdTnv0vUMlcfcb4yvkl6GAXvtwWE
10 q3dcRUh6vecqwa2ahKdvwWJDon3qA1Xe
10 qEi18Iw0qI0fe3fGMr6tTPpL6SbPMjk3
10 QPVchwY9MCJJ1W6kCWMncGWK2YfcUlFE
10 QQozajTq9wdmrO8AMwcL1i4EG0DA3I3a
10 QWumJVhaTjgcTVU6PILDgf5nPauD4VMm
10 RAM7lFRXtvR3BlgtbRU3dz5UxZYQQ06I
10 RAp5mFyjEBVSRTU203Y4Q1RDSlj7hN1v
10 rENclsy8XIuTnTvJfXagTFpcd78FX8WM
10 rhquEZ5rMuUSRIxtG9DQ6KVOyqPpL0MP
10 RpRE5maDwMQTa8oJt7vVNqff7ElrjLTq
10 s8SnoFuk0jR1CTdQ7pctd67nakJWN2Vc
10 sapgezVFdEYdD3IkqFZGaXcKG4z5P4KR
10 sBDaWzvCbXUiXcP9to4j8o716bXI0inx
10 SCuPKgJN6pAfwgoCy2Ech2U0DTfriL9q
10 Sd14OpeUCugURrfuu47xRwMGB1U6OSzB
10 SeSKZp3f2Lo9JAKP17WmkD2Nnl6I5knE
10 SnF0df244Nioa8VK7fAC8dfc9jQpAx4Y
10 Su9w1lri9UACf53cL1evAMKXVgI0nfqe
10 tgHSfEXcbYCejWXfsWDO4VXXbqtTVcqS
10 tVm8L7CmsGG0cox6GpzlkbQYl0Yavx6i
10 ULGqvJWOAtmPYINByDHwD0r9Mlf5niGK
10 UuNP4xguSOjcTHAzdtHBgm2eNz1Z5133
10 VPlmPWbTDtWppKumxNRUeeXklDk5GpRx
10 w6x5XtaoRWDqMCsYxgZIWuOKVdiGByAu
10 wcX8FCnaWngvBoYa5LrRlDsfRrr3C4kv
10 Wr4hWlUhGCKJpGDCeio8C1pLVt7DZm3X
10 WVQJq1JYFGgtR69JgWxUAKPb0RaKc90J
10 xEkmXBLggW8r1alEgwNX6ZIM6GGCsfmF
10 YbfaJNckJrgh9TvEBScUaEUCRhDJcgIL
10 ylbAYB5vBiEAmViEQOBwITUwjSZkwC7Q
10 ysKmfYcysVfnViisRBcXzgjjXMDgnKKv
10 YZMapJFORxWg84gej4UzQvGYSqBmsPOo
10 Z6SdYkOf5loRVj4uRk6cNiz10RfPnwNy
10 zokSjnkcDj1hdGEBE4feukfCtFmv82ZZ
bandit8@bandit:~$ cat data.txt | sort | uniq -c | grep -v 10
bandit8@bandit:~$ cat data.txt | sort | uniq -c | grep -v 10
1 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM
password of bandit9 - 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM
Bandit Level 9 - Level 10
$ ssh -p2220 bandit9@bandit.labs.overthewire.org
bandit9@bandit:~$ strings data.txt | grep "="
bandit9@bandit:~$ strings data.txt | grep "="
}========== the
p\l=
;c<Q=.dEXU!
3JprD========== passwordi
qC(=
~fDV3========== is
7=oc
zP=
~de=
3k=fQ
~o=0
69}=
%"=Y
=tZ~07
D9========== FGUW5ilLVJrxX9kMYMmlN4MgbpfMiqey
N=~[!N
zA=?0j
password of bandit10 - FGUW5ilLVJrxX9kMYMmlN4MgbpfMiqey
Bandit Level 10 - Level 11
$ ssh -p2220 bandit10@bandit.labs.overthewire.org
bandit10@bandit:~$ base64 --decode data.txt
bandit10@bandit:~$ pwd
/home/bandit10
bandit10@bandit:~$ ls
data.txt
bandit10@bandit:~$ base64 --decode data.txt
The password is dtR173fZKb0RRsDFSGsg2RWnpNVj3qRr
password of bandit11 - dtR173fZKb0RRsDFSGsg2RWnpNVj3qRr
Bandit Level 11 - Level 12
$ ssh -p2220 bandit11@bandit.labs.overthewire.org
bandit11@bandit:~$ cat data.txt
bandit11@bandit:~$ pwd
/home/bandit11
bandit11@bandit:~$ ls -la
total 24
drwxr-xr-x 2 root root 4096 Sep 19 2024 .
drwxr-xr-x 70 root root 4096 Sep 19 2024 ..
-rw-r--r-- 1 root root 220 Mar 31 2024 .bash_logout
-rw-r--r-- 1 root root 3771 Mar 31 2024 .bashrc
-rw-r----- 1 bandit12 bandit11 49 Sep 19 2024 data.txt
-rw-r--r-- 1 root root 807 Mar 31 2024 .profile
bandit11@bandit:~$ cat data.txt
Gur cnffjbeq vf 7k16JArUVv5LxVuJfsSVdbbtaHGlw9D4
Rotate 13 - Gur cnffjbeq vf 7k16JArUVv5LxVuJfsSVdbbtaHGlw9D4
Using the decode.com page to rotate.
bandit11@bandit:~$ cat data.txt | tr [a-m][n-z] [n-z][a-m] | tr [A-M][N-Z] [N-Z][A-M]
bandit11@bandit:~$ cat data.txt | tr [a-m][n-z] [n-z][a-m] | tr [A-M][N-Z] [N-Z][A-M]
The password is 7x16WNeHIi5YkIhWsfFIqoognUTyj9Q4
password of bandit12 - 7x16WNeHIi5YkIhWsfFIqoognUTyj9Q4
Bandit Level 12 - Level 13
$ ssh -p2220 bandit12@bandit.labs.overthewire.org
A file compressed many times with gzip, bzip2 and tar.
xxd is used to determine what type of file is
bandit12@bandit:~$ pwd
/home/bandit12
bandit12@bandit:~$ ls -la
total 24
drwxr-xr-x 2 root root 4096 Sep 19 2024 .
drwxr-xr-x 70 root root 4096 Sep 19 2024 ..
-rw-r--r-- 1 root root 220 Mar 31 2024 .bash_logout
-rw-r--r-- 1 root root 3771 Mar 31 2024 .bashrc
-rw-r----- 1 bandit13 bandit12 2583 Sep 19 2024 data.txt
-rw-r--r-- 1 root root 807 Mar 31 2024 .profile
bandit12@bandit:~$ mkdir /tmp/solution_level12
bandit12@bandit:~$ xxd -r data.txt > /tmp/solution_level12/data.txt
bandit12@bandit:~$ cd /tmp/solution_level12
bandit12@bandit:/tmp/solution_level12$ pwd
/tmp/solution_level12
bandit12@bandit:/tmp/solution_level12$ ls
data.txt
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17016
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:19 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:19 ..
-rw-rw-r-- 1 bandit12 bandit12 607 Mar 23 02:19 data.txt
bandit12@bandit:/tmp/solution_level12$ file data.txt
data.txt: gzip compressed data, was "data2.bin", last modified: Thu Sep 19 07:08:15 2024, max compression, from Unix, original size modulo 2^32 574
bandit12@bandit:/tmp/solution_level12$ mv data.txt data.gz
bandit12@bandit:/tmp/solution_level12$ gunzip data.gz
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17016
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:20 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:20 ..
-rw-rw-r-- 1 bandit12 bandit12 574 Mar 23 02:19 data
bandit12@bandit:/tmp/solution_level12$ file data
data: bzip2 compressed data, block size = 900k
bandit12@bandit:/tmp/solution_level12$ mv data data.bz2
bandit12@bandit:/tmp/solution_level12$ bunzip2 data.bz2
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17016
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:21 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:21 ..
-rw-rw-r-- 1 bandit12 bandit12 432 Mar 23 02:19 data
bandit12@bandit:/tmp/solution_level12$ file data
data: gzip compressed data, was "data4.bin", last modified: Thu Sep 19 07:08:15 2024, max compression, from Unix, original size modulo 2^32 20480
bandit12@bandit:/tmp/solution_level12$ mv data data.gz
bandit12@bandit:/tmp/solution_level12$ gunzip data.gz
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17032
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:21 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:21 ..
-rw-rw-r-- 1 bandit12 bandit12 20480 Mar 23 02:19 data
bandit12@bandit:/tmp/solution_level12$ file data
data: POSIX tar archive (GNU)
bandit12@bandit:/tmp/solution_level12$ mv data data.tar
bandit12@bandit:/tmp/solution_level12$ tar -xf data.tar
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17044
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:22 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:22 ..
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.bin
-rw-rw-r-- 1 bandit12 bandit12 20480 Mar 23 02:19 data.tar
bandit12@bandit:/tmp/solution_level12$ file data5.bin
data5.bin: POSIX tar archive (GNU)
bandit12@bandit:/tmp/solution_level12$ mv data5.bin data5.tar
bandit12@bandit:/tmp/solution_level12$ la -la
total 17044
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:22 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:22 ..
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.tar
-rw-rw-r-- 1 bandit12 bandit12 20480 Mar 23 02:19 data.tar
bandit12@bandit:/tmp/solution_level12$ tar -xf data5.tar
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17048
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:22 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:22 ..
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.tar
-rw-r--r-- 1 bandit12 bandit12 221 Sep 19 2024 data6.bin
-rw-rw-r-- 1 bandit12 bandit12 20480 Mar 23 02:19 data.tar
bandit12@bandit:/tmp/solution_level12$ file data.tar
data.tar: POSIX tar archive (GNU)
bandit12@bandit:/tmp/solution_level12$ tar -xf data.tar
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17060
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:23 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:23 ..
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.bin
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.tar
-rw-r--r-- 1 bandit12 bandit12 221 Sep 19 2024 data6.bin
-rw-rw-r-- 1 bandit12 bandit12 20480 Mar 23 02:19 data.tar
bandit12@bandit:/tmp/solution_level12$ file data6.bin
data6.bin: bzip2 compressed data, block size = 900k
bandit12@bandit:/tmp/solution_level12$ mv data6.bin data6.bz2
bandit12@bandit:/tmp/solution_level12$ bunzip2 data6.bz2
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17068
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:24 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:24 ..
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.bin
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.tar
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data6
-rw-rw-r-- 1 bandit12 bandit12 20480 Mar 23 02:19 data.tar
bandit12@bandit:/tmp/solution_level12$ file data6
data6: POSIX tar archive (GNU)
bandit12@bandit:/tmp/solution_level12$ mv data6 data6.tar
bandit12@bandit:/tmp/solution_level12$ tar -xf data6.tar
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17072
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:24 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:24 ..
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.bin
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.tar
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data6.tar
-rw-r--r-- 1 bandit12 bandit12 79 Sep 19 2024 data8.bin
-rw-rw-r-- 1 bandit12 bandit12 20480 Mar 23 02:19 data.tar
bandit12@bandit:/tmp/solution_level12$ file data8.bin
data8.bin: gzip compressed data, was "data9.bin", last modified: Thu Sep 19 07:08:15 2024, max compression, from Unix, original size modulo 2^32 49
bandit12@bandit:/tmp/solution_level12$ mv data8.bin data8.gz
bandit12@bandit:/tmp/solution_level12$ gunzip data8.gz
bandit12@bandit:/tmp/solution_level12$ ls -la
total 17072
drwxrwxr-x 2 bandit12 bandit12 4096 Mar 23 02:25 .
drwxrwx-wt 1 root root 17412096 Mar 23 02:25 ..
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.bin
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data5.tar
-rw-r--r-- 1 bandit12 bandit12 10240 Sep 19 2024 data6.tar
-rw-r--r-- 1 bandit12 bandit12 49 Sep 19 2024 data8
-rw-rw-r-- 1 bandit12 bandit12 20480 Mar 23 02:19 data.tar
bandit12@bandit:/tmp/solution_level12$ file data8
data8: ASCII text
bandit12@bandit:/tmp/solution_level12$ cat data8
The password is FO5dwFsc0cbaIiH0h8J2eUks2vdTDwAn
password of bandit13 - FO5dwFsc0cbaIiH0h8J2eUks2vdTDwAn
Bandit Level 13 - Level 14
$ ssh -p2220 bandit13@bandit.labs.overthewire.org
bandit13@bandit:~$ cat sshkey.private
bandit13@bandit:~$ cat sshkey.private
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
Using the sshkey.private of bandit14 in the console of bandit13 login as bandit14 to the localhost on port 2220.
With the sshkey.private you will connect as bandit14.
bandit14@bandit:~$ cat /etc/bandit_pass/bandit14
bandit14@bandit:~$ cat /etc/bandit_pass/bandit14
MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS
password of bandit14 - MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS
Bandit Level 14 - Level 15
Start the ssh connection as bandit14 after logging in as bandit13 and using the sshkey.private.
bandit13@bandit:~$ ssh -p2220 -i sshkey.private bandit14@localhost
Note: The key is in bandit13 home directory. Initiate the login process after logging in as bandit13 and use the sshkey.private file.
bandit13@bandit:~$ ssh -p2220 -i sshkey.private bandit14@localhost
The authenticity of host '[localhost]:2220 ([127.0.0.1]:2220)' can't be established.
ED25519 key fingerprint is SHA256:C2ihUBV7ihnV1wUXRb4RrEcLfXC5CXlhmAAM/urerLY.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Could not create directory '/home/bandit13/.ssh' (Permission denied).
Failed to add the host to the list of known hosts (/home/bandit13/.ssh/known_hosts).
_ _ _ _
| |__ __ _ _ __ __| (_) |_
| '_ \ / _` | '_ \ / _` | | __|
| |_) | (_| | | | | (_| | | |_
|_.__/ \__,_|_| |_|\__,_|_|\__|
This is an OverTheWire game server.
More information on http://www.overthewire.org/wargames
!!! You are trying to log into this SSH server with a password on port 2220 from localhost.
!!! Connecting from localhost is blocked to conserve resources.
!!! Please log out and log in again.
,----.. ,----, .---.
/ / \ ,/ .`| /. ./|
/ . : ,` .' : .--'. ' ;
. / ;. \ ; ; / /__./ \ : |
. ; / ` ; .'___,/ ,' .--'. ' \' .
; | ; \ ; | | : | /___/ \ | ' '
| : | ; | ' ; |.'; ; ; \ \; :
. | ' ' ' : `----' | | \ ; ` |
' ; \; / | ' : ; . \ .\ ;
\ \ ', / | | ' \ \ ' \ |
; : / ' : | : ' |--"
\ \ .' ; |.' \ \ ;
www. `---` ver '---' he '---" ire.org
Welcome to OverTheWire!
If you find any problems, please report them to the #wargames channel on
discord or IRC.
--[ Playing the games ]--
This machine might hold several wargames.
If you are playing "somegame", then:
* USERNAMES are somegame0, somegame1, ...
* Most LEVELS are stored in /somegame/.
* PASSWORDS for each level are stored in /etc/somegame_pass/.
Write-access to homedirectories is disabled. It is advised to create a
working directory with a hard-to-guess name in /tmp/. You can use the
command "mktemp -d" in order to generate a random and hard to guess
directory in /tmp/. Read-access to both /tmp/ is disabled and to /proc
restricted so that users cannot snoop on eachother. Files and directories
with easily guessable or short names will be periodically deleted! The /tmp
directory is regularly wiped.
Please play nice:
* don't leave orphan processes running
* don't leave exploit-files laying around
* don't annoy other players
* don't post passwords or spoilers
* again, DONT POST SPOILERS!
This includes writeups of your solution on your blog or website!
--[ Tips ]--
This machine has a 64bit processor and many security-features enabled
by default, although ASLR has been switched off. The following
compiler flags might be interesting:
-m32 compile for 32bit
-fno-stack-protector disable ProPolice
-Wl,-z,norelro disable relro
In addition, the execstack tool can be used to flag the stack as
executable on ELF binaries.
Finally, network-access is limited for most levels by a local
firewall.
--[ Tools ]--
For your convenience we have installed a few useful tools which you can find
in the following locations:
* gef (https://github.com/hugsy/gef) in /opt/gef/
* pwndbg (https://github.com/pwndbg/pwndbg) in /opt/pwndbg/
* gdbinit (https://github.com/gdbinit/Gdbinit) in /opt/gdbinit/
* pwntools (https://github.com/Gallopsled/pwntools)
* radare2 (http://www.radare.org/)
--[ More information ]--
For more information regarding individual wargames, visit
http://www.overthewire.org/wargames/
For support, questions or comments, contact us on discord or IRC.
Enjoy your stay!
bandit14@bandit:~$
bandit14@bandit:~$ telnet localhost 30000
bandit14@bandit:~$ telnet localhost 30000
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
paste the password of bandit14: MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS
Correct!
8xCjnmgoKbGLhHFAZlGE5Tmu4M2tKJQo
Connection closed by foreign host.
bandit14@bandit:~$ echo "MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS" | nc localhost 30000
Correct!
8xCjnmgoKbGLhHFAZlGE5Tmu4M2tKJQo
password of bandit15 - 8xCjnmgoKbGLhHFAZlGE5Tmu4M2tKJQo
Bandit Level 15 - Level 16
$ ssh -p2220 bandit15@bandit.labs.overthewire.org
bandit15@bandit:~$ echo "8xCjnmgoKbGLhHFAZlGE5Tmu4M2tKJQo" > /tmp/passbandit15.txt
Create a file with the password of the previous bandit15
bandit15@bandit:~$ openssl s_client localhost:30001 < /tmp/passbandit15.txt
bandit15@bandit:~$ openssl s_client localhost:30001 < /tmp/passbandit15.txt
CONNECTED(00000003)
Can't use SSL_get_servername
depth=0 CN = SnakeOil
verify error:num=18:self-signed certificate
verify return:1
depth=0 CN = SnakeOil
verify return:1
---
Certificate chain
0 s:CN = SnakeOil
i:CN = SnakeOil
a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA256
v:NotBefore: Jun 10 03:59:50 2024 GMT; NotAfter: Jun 8 03:59:50 2034 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = SnakeOil
issuer=CN = SnakeOil
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 2103 bytes and written 373 bytes
Verification error: self-signed certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 4096 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 18 (self-signed certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: DB913DD20979C7012B7A33EA837FE4FB8F10C05674E68702ACF9A134FF9EA6D3
Session-ID-ctx:
Resumption PSK: BBA80756820903613A85A773E680AE36B41A24E410CFAAA344B9FCA9D39613EEA8FDBE607244D65690E64305B88E0DE2
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - fa 93 ce 9e 9b db 91 e2-99 9f a3 a9 56 2b ad e3 ............V+..
0010 - be b0 b2 5a 13 ca 38 7f-10 b4 a9 ef 88 83 bb 67 ...Z..8........g
0020 - 95 08 6d 7c cd b2 55 95-c6 41 e2 f6 a1 f0 a3 04 ..m|..U..A......
0030 - d4 b2 94 df c1 06 24 0d-c9 43 cd 6e 7b 76 2b bb ......$..C.n{v+.
0040 - fa 10 65 12 2d bb 92 59-d7 6a 73 92 49 39 88 fb ..e.-..Y.js.I9..
0050 - 75 82 dc 90 88 49 b2 9f-02 ec 19 02 71 1e b9 ff u....I......q...
0060 - 29 fd 51 2d 49 08 86 be-89 bd 1d 5f fb 65 ef 1f ).Q-I......_.e..
0070 - 73 cc ba ff cc c3 b8 46-6d a1 fa c8 8e 27 3a 0c s......Fm....':.
0080 - 01 c5 1e a3 92 80 88 81-60 da 48 07 fb 0e a7 e3 ........`.H.....
0090 - fe 2c ca e7 1a 78 94 84-08 87 00 5f d9 7e ec 14 .,...x....._.~..
00a0 - a9 5f 5b 9b c7 d5 24 46-1c 5d 8c 03 93 96 5c dd ._[...$F.]....\.
00b0 - 5e 0d 72 46 bb 48 20 47-3f 61 73 ed b6 5b d9 48 ^.rF.H G?as..[.H
00c0 - 1d 3b 15 cf 2e 25 2b e3-a1 89 2e 73 bb 70 f1 17 .;...%+....s.p..
00d0 - 73 28 b4 3f 54 87 0b 8f-9f 0d a7 ec 0a 48 ab f0 s(.?T........H..
Start Time: 1742699697
Timeout : 7200 (sec)
Verify return code: 18 (self-signed certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 7BCBCF8F2A8625312E3AF88E52595E265E7C2432FABD252B093AE473DB8F0257
Session-ID-ctx:
Resumption PSK: 428EB612107234BBD53BEB46F0557883227782CD76C75A648364CA54BC7D02A9748DE77D86C945AF7462E4AD12BB8485
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - fa 93 ce 9e 9b db 91 e2-99 9f a3 a9 56 2b ad e3 ............V+..
0010 - 08 9e 2f d5 52 d2 e2 12-d6 41 f0 34 ed a3 5e 61 ../.R....A.4..^a
0020 - 62 fd 39 f1 4a 59 ae 50-d6 c3 34 b4 e2 74 85 f1 b.9.JY.P..4..t..
0030 - f2 1b 62 91 42 74 7c 61-39 99 46 9b 89 50 ef a9 ..b.Bt|a9.F..P..
0040 - 64 a9 b3 2c 70 c0 ae 0a-34 a6 e2 e7 7b e6 a8 0b d..,p...4...{...
0050 - d8 06 2a 05 29 df 1c ec-7a e5 ba 75 02 5f 75 c4 ..*.)...z..u._u.
0060 - 7a 0c 41 ae 5f 1f 0d 5c-7d 11 29 84 9e 34 64 80 z.A._..\}.)..4d.
0070 - cc e1 fc 84 67 41 e4 25-01 89 c7 b4 79 5f 93 c2 ....gA.%....y_..
0080 - 88 9e 8e 16 00 e3 cb 17-ae 43 ae b7 51 50 2b f5 .........C..QP+.
0090 - 76 32 41 30 6a 9b bf 02-e5 d8 c0 32 47 73 c4 fb v2A0j......2Gs..
00a0 - 44 2d b0 49 db b3 52 ed-e7 ff 95 08 15 22 ce ee D-.I..R......"..
00b0 - da ad ff 58 5d 6f 6a b8-fb af b6 19 e5 e2 96 2f ...X]oj......../
00c0 - 9d 6f 78 2e fa c1 65 8c-c3 c7 3b 94 4a 77 c9 5d .ox...e...;.Jw.]
00d0 - 5c a1 9d a5 33 76 b5 20-69 da a4 bf c6 1a 12 64 \...3v. i......d
Start Time: 1742699697
Timeout : 7200 (sec)
Verify return code: 18 (self-signed certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
Correct!
kSkvUpMQ7lBYyCM4GBPvCvT1BfWRy0Dx
closed
password of bandit16 - kSkvUpMQ7lBYyCM4GBPvCvT1BfWRy0Dx
Bandit Level 16 - Level 17
$ ssh -p2220 bandit16@bandit.labs.overthewire.org
bandit16@bandit:~$ nmap -Pn -p31000-32000 -sV localhost
Search for the ports that are in service from port 31000 to 32000 in the localhost.
bandit16@bandit:~$ nmap -Pn -p31000-32000 -sV localhost
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-03-23 03:29 UTC
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00022s latency).
Not shown: 996 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
31046/tcp open echo
31518/tcp open ssl/echo
31691/tcp open echo
31790/tcp open ssl/unknown
31960/tcp open echo
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port31790-TCP:V=7.94SVN%T=SSL%I=7%D=3/23%Time=67DF804A%P=x86_64-pc-linu
SF:x-gnu%r(GenericLines,32,"Wrong!\x20Please\x20enter\x20the\x20correct\x2
SF:0current\x20password\.\n")%r(GetRequest,32,"Wrong!\x20Please\x20enter\x
SF:20the\x20correct\x20current\x20password\.\n")%r(HTTPOptions,32,"Wrong!\
SF:x20Please\x20enter\x20the\x20correct\x20current\x20password\.\n")%r(RTS
SF:PRequest,32,"Wrong!\x20Please\x20enter\x20the\x20correct\x20current\x20
SF:password\.\n")%r(Help,32,"Wrong!\x20Please\x20enter\x20the\x20correct\x
SF:20current\x20password\.\n")%r(FourOhFourRequest,32,"Wrong!\x20Please\x2
SF:0enter\x20the\x20correct\x20current\x20password\.\n")%r(LPDString,32,"W
SF:rong!\x20Please\x20enter\x20the\x20correct\x20current\x20password\.\n")
SF:%r(SIPOptions,32,"Wrong!\x20Please\x20enter\x20the\x20correct\x20curren
SF:t\x20password\.\n");
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 169.13 seconds
SF-Port31790-TCP:V=7.94SVN%T=SSL%I=7%D=3/23%Time=67DF804A%P=x86_64-pc-linu
In the line above is shows that the port 31790 needs a password. Using the password kSkvUpMQ7lBYyCM4GBPvCvT1BfWRy0Dx
echo "kSkvUpMQ7lBYyCM4GBPvCvT1BfWRy0Dx" | openssl s_client -connect localhost:31790 -ign_eof
bandit16@bandit:~$ echo "kSkvUpMQ7lBYyCM4GBPvCvT1BfWRy0Dx" | openssl s_client -connect localhost:31790 -ign_eof
CONNECTED(00000003)
Can't use SSL_get_servername
depth=0 CN = SnakeOil
verify error:num=18:self-signed certificate
verify return:1
depth=0 CN = SnakeOil
verify return:1
---
Certificate chain
0 s:CN = SnakeOil
i:CN = SnakeOil
a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA256
v:NotBefore: Jun 10 03:59:50 2024 GMT; NotAfter: Jun 8 03:59:50 2034 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = SnakeOil
issuer=CN = SnakeOil
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 2103 bytes and written 373 bytes
Verification error: self-signed certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 4096 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 18 (self-signed certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: B5604EB1371F87BC2243B2DFF084A9FDBA1FC9B7E429F83FC2A338B93FE7DF05
Session-ID-ctx:
Resumption PSK: 074C0C4998116196DA2755F6F98D26BC93C2ABAD63B9A9B79C66EF991D9C6F3997B695382FA0C5751E626619E80C4E8C
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - 65 4f 28 b4 a4 21 c3 43-f9 75 e1 e7 ba c3 6c 78 eO(..!.C.u....lx
0010 - 7e d4 e7 e8 d5 98 2c be-53 fc 79 d6 e4 72 55 c8 ~.....,.S.y..rU.
0020 - 08 9a 4c 3c 51 5d 38 9f-e6 1b 1f fe a2 26 6f ec ..L<Q]8......&o.
0030 - fd ae ff 67 3d 35 f2 83-81 b7 aa 1a db 0e c2 8c ...g=5..........
0040 - 58 a6 cf 66 ae cf 9e 96-d6 62 ce 00 f1 f3 16 c2 X..f.....b......
0050 - 73 49 ba 91 b6 e3 49 92-c7 fc 56 14 da c6 27 1f sI....I...V...'.
0060 - 7c 23 a2 35 3d 9d f5 55-d8 0c 85 a8 d6 70 13 f5 |#.5=..U.....p..
0070 - e1 8a 1c 2a a0 6e 9c 6d-05 3a 1e 9f b6 80 a5 df ...*.n.m.:......
0080 - 12 74 f3 b0 36 30 ba 7e-f8 40 14 06 0a 52 2b a1 .t..60.~.@...R+.
0090 - 78 49 14 65 fd 5b 9b 3e-60 a0 1d 10 2d 1c 07 d0 xI.e.[.>`...-...
00a0 - e0 14 f8 c1 db 81 4a bc-49 2d 35 22 c7 24 78 6d ......J.I-5".$xm
00b0 - 9b f0 67 c7 25 39 a9 36-60 8c a2 c2 bd d9 86 0a ..g.%9.6`.......
00c0 - a5 5b 98 01 0c aa 09 d6-9b 54 8c 7a e4 90 89 af .[.......T.z....
00d0 - c1 9c 45 11 e6 79 99 49-44 18 d0 b3 e2 f2 e2 f1 ..E..y.ID.......
Start Time: 1742701153
Timeout : 7200 (sec)
Verify return code: 18 (self-signed certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: F38B4EF522C6B53FCFB4035714DCD8F86442DC9E18C45BAAA255F3B422FB98CA
Session-ID-ctx:
Resumption PSK: 7A6764601D7C6FBC47B013CA24345D437F49368C4799BF1FC1B70373DB901BFA8D95DE5C830F5A6112CC7C10580EC85F
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - 65 4f 28 b4 a4 21 c3 43-f9 75 e1 e7 ba c3 6c 78 eO(..!.C.u....lx
0010 - bb 92 4b 34 02 18 fe 7d-17 17 c7 e2 4a e5 88 67 ..K4...}....J..g
0020 - c9 9e ae d0 51 5a 91 00-ca 97 b1 a6 4f 2a 9b 32 ....QZ......O*.2
0030 - 49 3a e3 7e 2d 81 20 71-0d 3f b3 cf 31 cf bd f1 I:.~-. q.?..1...
0040 - e0 44 2a a4 0b f4 ae 0f-63 1f d0 e9 2d 7a f8 52 .D*.....c...-z.R
0050 - c1 bf 0a fe 62 39 22 61-63 6a 49 52 1d 1e 1b e7 ....b9"acjIR....
0060 - 1c e2 07 71 7d 43 3d f7-4a 50 85 25 ae 1b 8b ba ...q}C=.JP.%....
0070 - f7 a3 64 82 19 19 c7 5b-10 b7 ff b1 d5 fe 48 66 ..d....[......Hf
0080 - 56 36 44 ad 45 ca 5b db-d2 59 eb a0 c5 21 96 2b V6D.E.[..Y...!.+
0090 - 75 8d 40 04 b0 c7 c7 02-aa aa 31 f5 2c 06 e2 7b u.@.......1.,..{
00a0 - e5 5e e8 24 b7 15 08 82-9d 18 ce ec 81 5b ab 1c .^.$.........[..
00b0 - 8f 30 d7 3b e8 2e ec f2-53 49 7a fa 18 20 7c a9 .0.;....SIz.. |.
00c0 - 48 08 6a 27 83 d4 dd 86-01 ac 3f 66 c6 4b 01 22 H.j'......?f.K."
00d0 - 8b a2 c5 58 3d f4 81 63-ad 78 62 ac c2 f7 05 8b ...X=..c.xb.....
Start Time: 1742701153
Timeout : 7200 (sec)
Verify return code: 18 (self-signed certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
Correct!
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
closed
The end of the result is the PRIVATE KEY of the access to the next level.
Save the following text in a file called key.private
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
Connect to the next level using the private key.
$ ssh -p2220 -i key.private bandit17@bandit.labs.overthewire.org
Bandit Level 17 - Level 18
$ ssh -p2220 -i key.private bandit17@bandit.labs.overthewire.org
$ ssh -p2220 -i key.private bandit17@bandit.labs.overthewire.org
_ _ _ _
| |__ __ _ _ __ __| (_) |_
| '_ \ / _` | '_ \ / _` | | __|
| |_) | (_| | | | | (_| | | |_
|_.__/ \__,_|_| |_|\__,_|_|\__|
This is an OverTheWire game server.
More information on http://www.overthewire.org/wargames
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: UNPROTECTED PRIVATE KEY FILE! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Permissions 0664 for 'key.private' are too open.
It is required that your private key files are NOT accessible by others.
This private key will be ignored.
Load key "key.private": bad permissions
bandit17@bandit.labs.overthewire.org's password:
If the above appeared change the permission of the key.private file to 600
$ chmod 600 key.private and try to connect again using the key.private.
$ ssh -p2220 -i key.private bandit17@bandit.labs.overthewire.or
bandit17@bandit:~$ diff passwords.old passwords.new
42c42
< ktfgBvpMzWKR5ENj26IbLGSblgUG9CzB
---
> x2gLTTjFwMOhQ8oWNbMN362QKxfRqGlO
Line 5 is the new password.
password of bandit18 - x2gLTTjFwMOhQ8oWNbMN362QKxfRqGlO
Bandit Level 18 - Level 19
$ ssh -p2220 bandit18@bandit.labs.overthewire.org
When connecting to the server using ssh and it is validated but is logs out.
$ ssh -p2220 bandit18@bandit.labs.overthewire.org
_ _ _ _
| |__ __ _ _ __ __| (_) |_
| '_ \ / _` | '_ \ / _` | | __|
| |_) | (_| | | | | (_| | | |_
|_.__/ \__,_|_| |_|\__,_|_|\__|
This is an OverTheWire game server.
More information on http://www.overthewire.org/wargames
bandit18@bandit.labs.overthewire.org's password:
,----.. ,----, .---.
/ / \ ,/ .`| /. ./|
/ . : ,` .' : .--'. ' ;
. / ;. \ ; ; / /__./ \ : |
. ; / ` ; .'___,/ ,' .--'. ' \' .
; | ; \ ; | | : | /___/ \ | ' '
| : | ; | ' ; |.'; ; ; \ \; :
. | ' ' ' : `----' | | \ ; ` |
' ; \; / | ' : ; . \ .\ ;
\ \ ', / | | ' \ \ ' \ |
; : / ' : | : ' |--"
\ \ .' ; |.' \ \ ;
www. `---` ver '---' he '---" ire.org
Welcome to OverTheWire!
If you find any problems, please report them to the #wargames channel on
discord or IRC.
--[ Playing the games ]--
This machine might hold several wargames.
If you are playing "somegame", then:
* USERNAMES are somegame0, somegame1, ...
* Most LEVELS are stored in /somegame/.
* PASSWORDS for each level are stored in /etc/somegame_pass/.
Write-access to homedirectories is disabled. It is advised to create a
working directory with a hard-to-guess name in /tmp/. You can use the
command "mktemp -d" in order to generate a random and hard to guess
directory in /tmp/. Read-access to both /tmp/ is disabled and to /proc
restricted so that users cannot snoop on eachother. Files and directories
with easily guessable or short names will be periodically deleted! The /tmp
directory is regularly wiped.
Please play nice:
* don't leave orphan processes running
* don't leave exploit-files laying around
* don't annoy other players
* don't post passwords or spoilers
* again, DONT POST SPOILERS!
This includes writeups of your solution on your blog or website!
--[ Tips ]--
This machine has a 64bit processor and many security-features enabled
by default, although ASLR has been switched off. The following
compiler flags might be interesting:
-m32 compile for 32bit
-fno-stack-protector disable ProPolice
-Wl,-z,norelro disable relro
In addition, the execstack tool can be used to flag the stack as
executable on ELF binaries.
Finally, network-access is limited for most levels by a local
firewall.
--[ Tools ]--
For your convenience we have installed a few useful tools which you can find
in the following locations:
* gef (https://github.com/hugsy/gef) in /opt/gef/
* pwndbg (https://github.com/pwndbg/pwndbg) in /opt/pwndbg/
* gdbinit (https://github.com/gdbinit/Gdbinit) in /opt/gdbinit/
* pwntools (https://github.com/Gallopsled/pwntools)
* radare2 (http://www.radare.org/)
--[ More information ]--
For more information regarding individual wargames, visit
http://www.overthewire.org/wargames/
For support, questions or comments, contact us on discord or IRC.
Enjoy your stay!
Byebye !
Connection to bandit.labs.overthewire.org closed.
In the above connection it connected but it logs out after logging in due to a line in .bashrc. To get the file readme execute the command using the ssh.
$ ssh -p2220 bandit18@bandit.labs.overthewire.org "cat readme"
_ _ _ _
| |__ __ _ _ __ __| (_) |_
| '_ \ / _` | '_ \ / _` | | __|
| |_) | (_| | | | | (_| | | |_
|_.__/ \__,_|_| |_|\__,_|_|\__|
This is an OverTheWire game server.
More information on http://www.overthewire.org/wargames
bandit18@bandit.labs.overthewire.org's password:
cGWpMaKXVwDUNgPAVJbWYuGHVn9zl3j8
password of bandit19 - cGWpMaKXVwDUNgPAVJbWYuGHVn9zl3j8
Bandit Level 19 - Level 20
$ ssh -p2220 bandit19@bandit.labs.overthewire.org
bandit19@bandit:~$ pwd
/home/bandit19
bandit19@bandit:~$ ls -la
total 36
drwxr-xr-x 2 root root 4096 Sep 19 2024 .
drwxr-xr-x 70 root root 4096 Sep 19 2024 ..
-rwsr-x--- 1 bandit20 bandit19 14880 Sep 19 2024 bandit20-do
-rw-r--r-- 1 root root 220 Mar 31 2024 .bash_logout
-rw-r--r-- 1 root root 3771 Mar 31 2024 .bashrc
-rw-r--r-- 1 root root 807 Mar 31 2024 .profile
bandit19@bandit:~$ ./bandit20-do
bandit19@bandit:~$ ./bandit20-do
Run a command as another user.
Example: ./bandit20-do id
bandit19@bandit:~$ ./bandit20-do cat /etc/bandit_pass/bandit20
bandit19@bandit:~$ ./bandit20-do cat /etc/bandit_pass/bandit20
0qXahG8ZjOVMN9Ghs7iOWsCfZyXOUbYO
password of bandit20 - 0qXahG8ZjOVMN9Ghs7iOWsCfZyXOUbYO
Bandit Level 20 - Level 21
$ ssh -p2220 bandit20@bandit.labs.overthewire.org
Note: it makes a connection to localhost on the port you specify as a commandline argument
bandit20@bandit:~$ pwd
/home/bandit20
bandit20@bandit:~$ ls -la
total 36
drwxr-xr-x 2 root root 4096 Sep 19 2024 .
drwxr-xr-x 70 root root 4096 Sep 19 2024 ..
-rw-r--r-- 1 root root 220 Mar 31 2024 .bash_logout
-rw-r--r-- 1 root root 3771 Mar 31 2024 .bashrc
-rw-r--r-- 1 root root 807 Mar 31 2024 .profile
-rwsr-x--- 1 bandit21 bandit20 15604 Sep 19 2024 suconnect
A command suconnect will be used in this exercise. Before running the command, open another ssh connection to the bandit server with the same user bandit20.
In console 1, run the following command and do not close or break it because the password will be sent to the console 1.
bandit20@bandit:~$ nc -vv -lv -p 12345
bandit20@bandit:~$ nc -vv -lv -p 12345
Listening on 0.0.0.0 12345
In console 2, run the following command
bandit20@bandit:~$ ./suconnect 12345
bandit20@bandit:~$ ./suconnect 12345
Read: 0qXahG8ZjOVMN9Ghs7iOWsCfZyXOUbYO
Password matches, sending next password
After running the suconnect in console 2, you should see in console 1 the following.
bandit20@bandit:~$ nc -vv -lv -p 12345
Listening on 0.0.0.0 12345
Connection received on localhost 36210
0qXahG8ZjOVMN9Ghs7iOWsCfZyXOUbYO
EeoULMCra2q0dSkYj561DX7s1CpBuOBt
password of bandit21 - EeoULMCra2q0dSkYj561DX7s1CpBuOBt
Bandit Level 21 - Level 22
$ ssh -p2220 bandit21@bandit.labs.overthewire.org
Search for the cron job for bandit22 in the /etc/cron.d
bandit21@bandit:~$ cat /etc/cron.d/cronjob_bandit22
bandit21@bandit:~$ cat /etc/cron.d
cron.d/ cron.daily/
bandit21@bandit:~$ cat /etc/cron.d/
cronjob_bandit22 cronjob_bandit24 otw-tmp-dir sysstat
cronjob_bandit23 e2scrub_all .placeholder
bandit21@bandit:~$ cat /etc/cron.d/cronjob_bandit22
@reboot bandit22 /usr/bin/cronjob_bandit22.sh &> /dev/null
* * * * * bandit22 /usr/bin/cronjob_bandit22.sh &> /dev/null
bandit21@bandit:~$ ls -l /usr/bin/cronjob_bandit22.sh
-rwxr-x--- 1 bandit22 bandit21 130 Sep 19 2024 /usr/bin/cronjob_bandit22.sh
The cron job for bandit22 is cronjob_bandit22 and the file can be executed by the group bandit21.
Get the content of the script in the cron job.
bandit21@bandit:~$ cat /usr/bin/cronjob_bandit22.sh
bandit21@bandit:~$ cat /usr/bin/cronjob_bandit22.sh
#!/bin/bash
chmod 644 /tmp/t7O6lds9S0RqQh9aMcz6ShpAoZKF7fgv
cat /etc/bandit_pass/bandit22 > /tmp/t7O6lds9S0RqQh9aMcz6ShpAoZKF7fgv
The file /etc/bandit_pass/bandit22 cannot be read by bandit21 but the file created in the /tmp/t7O6lds9S0RqQh9aMcz6ShpAoZKF7fgv is the same content which is the password of bandit22.
bandit21@bandit:~$ cat /tmp/t7O6lds9S0RqQh9aMcz6ShpAoZKF7fgv
bandit21@bandit:~$ cat /tmp/t7O6lds9S0RqQh9aMcz6ShpAoZKF7fgv
tRae0UfB9v0UzbCdn9cY0gQnds9GF58Q
password of bandit22 - tRae0UfB9v0UzbCdn9cY0gQnds9GF58Q
Bandit Level 22 - Level 23
$ ssh -p2220 bandit22@bandit.labs.overthewire.org
Get the cronjob from /etc/cron.d for bandit23
bandit22@bandit: $ cat /etc/cron.d/cronjob_bandit23
bandit22@bandit:~$ pwd
/home/bandit22
bandit22@bandit:~$ cd /etc/cron.d
bandit22@bandit:/etc/cron.d$ ls -la
total 44
drwxr-xr-x 2 root root 4096 Sep 19 2024 .
drwxr-xr-x 121 root root 12288 Sep 20 2024 ..
-rw-r--r-- 1 root root 120 Sep 19 2024 cronjob_bandit22
-rw-r--r-- 1 root root 122 Sep 19 2024 cronjob_bandit23
-rw-r--r-- 1 root root 120 Sep 19 2024 cronjob_bandit24
-rw-r--r-- 1 root root 201 Apr 8 2024 e2scrub_all
-rwx------ 1 root root 52 Sep 19 2024 otw-tmp-dir
-rw-r--r-- 1 root root 102 Mar 31 2024 .placeholder
-rw-r--r-- 1 root root 396 Jan 9 2024 sysstat
bandit22@bandit:/etc/cron.d$ ls -l /etc/cron.d/cronjob_bandit23
-rw-r--r-- 1 root root 122 Sep 19 2024 /etc/cron.d/cronjob_bandit23
bandit22@bandit:/etc/cron.d$ cat /etc/cron.d/cronjob_bandit23
@reboot bandit23 /usr/bin/cronjob_bandit23.sh &> /dev/null
* * * * * bandit23 /usr/bin/cronjob_bandit23.sh &> /dev/null
bandit22@bandit:/etc/cron.d$ cat /usr/bin/cronjob_bandit23.sh
#!/bin/bash
myname=$(whoami)
mytarget=$(echo I am user $myname | md5sum | cut -d ' ' -f 1)
echo "Copying passwordfile /etc/bandit_pass/$myname to /tmp/$mytarget"
cat /etc/bandit_pass/$myname > /tmp/$mytarget
The script that is being executed inside the cron job is /usr/bin/cronjob_bandit23.sh.
bandit22@bandit:/etc/cron.d$ cat /usr/bin/cronjob_bandit23.sh
bandit22@bandit:/etc/cron.d$ cat /usr/bin/cronjob_bandit23.sh
#!/bin/bash
myname=$(whoami)
mytarget=$(echo I am user $myname | md5sum | cut -d ' ' -f 1)
echo "Copying passwordfile /etc/bandit_pass/$myname to /tmp/$mytarget"
cat /etc/bandit_pass/$myname > /tmp/$mytarget
Since the script is run in a cronjob, this means it is executed and have the following information:
myname=·(whoami) which is myname=bandit23
mytarget=$(echo I am user $myname | md5sum | cut -d ' ' -f 1) will be the following command
mytarget=$(echo I am user bandit23 | md5sum | cut -d ' ' -f 1)
bandit22@bandit:/etc/cron.d$ mytarget=$(echo I am user bandit23 | md5sum | cut -d ' ' -f 1)
bandit22@bandit:/etc/cron.d$ echo $mytarget
8ca319486bfbbc3663ea0fbe81326349
The file therefor is /tmp/$mytarget which is /tmp/8ca319486bfbbc3663ea0fbe81326349
bandit22@bandit:/etc/cron.d$ cat /tmp/8ca319486bfbbc3663ea0fbe81326349
bandit22@bandit:/etc/cron.d$ mytarget=$(echo I am user bandit23 | md5sum | cut -d ' ' -f 1)
bandit22@bandit:/etc/cron.d$ echo $mytarget
8ca319486bfbbc3663ea0fbe81326349
bandit22@bandit:/etc/cron.d$ cat /tmp/8ca319486bfbbc3663ea0fbe81326349
0Zf11ioIjMVN551jX3CmStKLYqjk54Ga
password of bandit23 - 0Zf11ioIjMVN551jX3CmStKLYqjk54Ga
Bandit Level 23 - Level 24
$ ssh -p2220 bandit23@bandit.labs.overthewire.org
Search for the cronjob for bandit24 and the script.
bandit23@bandit:~$ pwd
/home/bandit23
bandit23@bandit:~$ cd /etc/cron.d
bandit23@bandit:/etc/cron.d$ ls -la
total 44
drwxr-xr-x 2 root root 4096 Sep 19 2024 .
drwxr-xr-x 121 root root 12288 Sep 20 2024 ..
-rw-r--r-- 1 root root 120 Sep 19 2024 cronjob_bandit22
-rw-r--r-- 1 root root 122 Sep 19 2024 cronjob_bandit23
-rw-r--r-- 1 root root 120 Sep 19 2024 cronjob_bandit24
-rw-r--r-- 1 root root 201 Apr 8 2024 e2scrub_all
-rwx------ 1 root root 52 Sep 19 2024 otw-tmp-dir
-rw-r--r-- 1 root root 102 Mar 31 2024 .placeholder
-rw-r--r-- 1 root root 396 Jan 9 2024 sysstat
bandit23@bandit:/etc/cron.d$ cat cronjob_bandit24
@reboot bandit24 /usr/bin/cronjob_bandit24.sh &> /dev/null
* * * * * bandit24 /usr/bin/cronjob_bandit24.sh &> /dev/null
bandit23@bandit:/etc/cron.d$ cat /usr/bin/cronjob_bandit24.sh
#!/bin/bash
myname=$(whoami)
cd /var/spool/$myname/foo
echo "Executing and deleting all scripts in /var/spool/$myname/foo:"
for i in * .*;
do
if [ "$i" != "." -a "$i" != ".." ];
then
echo "Handling $i"
owner="$(stat --format "%U" ./$i)"
if [ "${owner}" = "bandit23" ]; then
timeout -s 9 60 ./$i
fi
rm -f ./$i
fi
done
Analyzing the script /usr/bin/cronjob_bandit24.sh, it is executing all scripts in the directory /var/spool/$myname/foo.
We know that $myname is myname=$(whoami) which should be the user bandit24.
So we have to prepare a script to be run by bandit24 and place it in the directory /var/spool/bandit24/foo/.
Create a script in /tmp
bandit23@bandit:/home/bandit24$ nano /tmp/scriptbandit24.sh
Put the following inside the file /tmp/scriptbandit.sh
#!/bin/bash
cat /etc/bandit_pass/bandit24 > /tmp/password_bandit24
Then make the file executable.
bandit23@bandit:/home/bandit24$ chmod a+x /tmp/scriptbandit24.sh
Then copy the script created from /tmp/scriptbandit24.sh to the folder /var/spool/bandit24/foo/.
bandit23@bandit:/home/bandit24$ cp /tmp/scriptbandit24.sh /var/spool/bandit24/foo/
After copying, wait until a file is created in the /tmp directory which is the /tmp/password_bandit24
bandit23@bandit:/home/bandit24$ cat /tmp/password_bandit24
bandit23@bandit:/home/bandit24$ cat /tmp/password_bandit24
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8
password of bandit24 - gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8
Bandit Level 24 - Level 25
First create a file with the 10,000 combiation of the 4-DIGIT pincode.
In the KALI LINUX let us use the software crunch to create the file.
kali@kali:/$ crunch 4 4 1234567890 -o pincodes
Upload the file pincodes to the bandit server using the following commands.
scp -P2220 pincodes bandit24@bandit.labs.overthewire.org:/tmp
$ scp -P2220 pincodes bandit24@bandit.labs.overthewire.org:/tmp
_ _ _ _
| |__ __ _ _ __ __| (_) |_
| '_ \ / _` | '_ \ / _` | | __|
| |_) | (_| | | | | (_| | | |_
|_.__/ \__,_|_| |_|\__,_|_|\__|
This is an OverTheWire game server.
More information on http://www.overthewire.org/wargames
bandit24@bandit.labs.overthewire.org's password:
pincodes 100% 49KB 314.3KB/s 00:00
Now, login to the bandit and go to the /tmp directory
$ ssh -p2220 bandit24@bandit.labs.overthewire.org
bandit24@bandit:~$ cd /tmp/
In the instructions: A daemon is listening on port 30002 and will give you the password for bandit25 if given the password for bandit24 and a secret numeric 4-digit pincode. There is no way to retrieve the pincode except by going through all of the 10000 combinations, called brute-forcing.
A new file should be created with a "PASSWORD PIN", the password gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 and then the pincode
bandit24@bandit:/tmp$ echo "" passpin; while read ln; do echo "gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 $ln" >> passpin; done < pincodes
A new file is created, passpin which is the combination of the password and the 4-digit code. Check if the file is ok.
bandit24@bandit:/tmp$ cat passpin
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0080
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0091
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0092
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0093
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0094
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0095
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0096
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0097
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0098
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0099
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0090
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0001
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0002
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0003
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0004
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0005
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0006
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0007
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0008
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0009
gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8 0000
There should be 10,000 lines.
Now the file should be feed to port 30002 to the localhost.
bandit24@bandit:/tmp$ nc localhost 30002 < passpin
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Wrong! Please enter the correct current password and pincode. Try again.
Correct!
The password of user bandit25 is iCi86ttT4KSNe1armKiwbQNmB3YJP3q4
password of bandit25 - iCi86ttT4KSNe1armKiwbQNmB3YJP3q4
Bandit Level 25 - Level 26
$ ssh -p2220 bandit25@bandit.labs.overthewire.org
bandit25@bandit:~$ ls -ltr
In the home directory of bandit25 there is a bandit26.sshkey file which is the key for bandit26. Using this key to connect to the bandit.
bandit25@bandit:~$ ls
bandit26.sshkey
bandit25@bandit:~$ pwd
/home/bandit25
bandit25@bandit:~$ ls -l
total 4
-r-------- 1 bandit25 bandit25 1679 Sep 19 2024 bandit26.sshkey
bandit25@bandit:~$ cat bandit26.sshkey
-----BEGIN RSA PRIVATE KEY-----
MIIEpQIBAAKCAQEApis2AuoooEqeYWamtwX2k5z9uU1Afl2F8VyXQqbv/LTrIwdW
pTfaeRHXzr0Y0a5Oe3GB/+W2+PReif+bPZlzTY1XFwpk+DiHk1kmL0moEW8HJuT9
/5XbnpjSzn0eEAfFax2OcopjrzVqdBJQerkj0puv3UXY07AskgkyD5XepwGAlJOG
xZsMq1oZqQ0W29aBtfykuGie2bxroRjuAPrYM4o3MMmtlNE5fC4G9Ihq0eq73MDi
1ze6d2jIGce873qxn308BA2qhRPJNEbnPev5gI+5tU+UxebW8KLbk0EhoXB953Ix
3lgOIrT9Y6skRjsMSFmC6WN/O7ovu8QzGqxdywIDAQABAoIBAAaXoETtVT9GtpHW
qLaKHgYtLEO1tOFOhInWyolyZgL4inuRRva3CIvVEWK6TcnDyIlNL4MfcerehwGi
il4fQFvLR7E6UFcopvhJiSJHIcvPQ9FfNFR3dYcNOQ/IFvE73bEqMwSISPwiel6w
e1DjF3C7jHaS1s9PJfWFN982aublL/yLbJP+ou3ifdljS7QzjWZA8NRiMwmBGPIh
Yq8weR3jIVQl3ndEYxO7Cr/wXXebZwlP6CPZb67rBy0jg+366mxQbDZIwZYEaUME
zY5izFclr/kKj4s7NTRkC76Yx+rTNP5+BX+JT+rgz5aoQq8ghMw43NYwxjXym/MX
c8X8g0ECgYEA1crBUAR1gSkM+5mGjjoFLJKrFP+IhUHFh25qGI4Dcxxh1f3M53le
wF1rkp5SJnHRFm9IW3gM1JoF0PQxI5aXHRGHphwPeKnsQ/xQBRWCeYpqTme9amJV
tD3aDHkpIhYxkNxqol5gDCAt6tdFSxqPaNfdfsfaAOXiKGrQESUjIBcCgYEAxvmI
2ROJsBXaiM4Iyg9hUpjZIn8TW2UlH76pojFG6/KBd1NcnW3fu0ZUU790wAu7QbbU
i7pieeqCqSYcZsmkhnOvbdx54A6NNCR2btc+si6pDOe1jdsGdXISDRHFb9QxjZCj
6xzWMNvb5n1yUb9w9nfN1PZzATfUsOV+Fy8CbG0CgYEAifkTLwfhqZyLk2huTSWm
pzB0ltWfDpj22MNqVzR3h3d+sHLeJVjPzIe9396rF8KGdNsWsGlWpnJMZKDjgZsz
JQBmMc6UMYRARVP1dIKANN4eY0FSHfEebHcqXLho0mXOUTXe37DWfZza5V9Oify3
JquBd8uUptW1Ue41H4t/ErsCgYEArc5FYtF1QXIlfcDz3oUGz16itUZpgzlb71nd
1cbTm8EupCwWR5I1j+IEQU+JTUQyI1nwWcnKwZI+5kBbKNJUu/mLsRyY/UXYxEZh
ibrNklm94373kV1US/0DlZUDcQba7jz9Yp/C3dT/RlwoIw5mP3UxQCizFspNKOSe
euPeaxUCgYEAntklXwBbokgdDup/u/3ms5Lb/bm22zDOCg2HrlWQCqKEkWkAO6R5
/Wwyqhp/wTl8VXjxWo+W+DmewGdPHGQQ5fFdqgpuQpGUq24YZS8m66v5ANBwd76t
IZdtF5HXs2S5CADTwniUS5mX1HO9l5gUkk+h0cH5JnPtsMCnAUM+BRY=
-----END RSA PRIVATE KEY-----
As user bandit25 gather information of the server and the login.
bandit25@bandit:~$ dpkg --list | grep openssh
ii openssh-client 1:9.6p1-3ubuntu13.5 amd64 secure shell (SSH) client, for secure access to remote machines
ii openssh-server 1:9.6p1-3ubuntu13.5 amd64 secure shell (SSH) server, for secure access from remote machines
ii openssh-sftp-server 1:9.6p1-3ubuntu13.5 amd64 secure shell (SSH) sftp server module, for SFTP access from remote machines
The shell of the user bandit26 which makes it non-interactive.
bandit25@bandit:~$ cat /etc/passwd | grep bandit26
bandit25@bandit:~$ cat /etc/passwd | grep bandit26
bandit26:x:11026:11026:bandit level 26:/home/bandit26:/usr/bin/showtext
The shell login is /usr/bin/showtext, and getting this file is a custom script which execute an "exit 0".
bandit25@bandit:~$ cat /usr/bin/showtext
bandit25@bandit:~$ cat /usr/bin/showtext
#!/bin/sh
export TERM=linux
exec more ~/text.txt
exit 0