Search Results

overthewire

OverTheWire: Bandit Level 0 to Level 1

lvl1

Level goal: The password for the next level is stored in a file called readme located in the home directory. Use this password to log into bandit1 using SSH. Whenever you find a password for a level, use SSH to log into that level and continue the game.

This level is a simple giveaway too. Simply run ls to view the current directory as instructed by the level’s hint, and then cat the readme file to view its content.

bandit0@melinda:~$ ls
readme
bandit0@melinda:~$ cat readme
boJ9jbbUNNfktd78OOpsqOltutMc3MY1

The password to level 1 environment is boJ9jbbUNNfktd78OOpsqOltutMc3MY1

OverTheWire Bandit – Level 0 to 6 – detailed step-by-step walkthrough video with explanations!

OverTheWire: Bandit Level 0

Definitely, level 0 is a giveaway to get you started with the actual challenges.

Level 0 goal: The goal of this level is for you to log into the game using SSH. The host to which you need to connect is bandit.labs.overthewire.org. The username is bandit0 and the password is bandit0. Once logged in, go to the Level 1 page to find out how to beat Level 1.

Firstly, you should know how to connect to the bandit.labs.overthewire.org server via secure shell (SSH) protocol. If you are using Kali Linux, you can directly run an SSH command to connect to the server. However, if you are using Windows, there is no SSH client installed by default.

putty

While there are many very good SSH clients in the market that were designed for Windows environment usages, personally, I would prefer PuTTY as it is easy to setup and pretty lightweight.

Once you are done, press “Open” and you should be able to gain access to the bandit0 box.

lvl0

OverTheWire Bandit – Level 0 to 6 – detailed step-by-step walkthrough video with explanations!

OverTheWire Bandit Write-up

I created a series of detailed step-by-step walkthrough video with explanations.
Check out the playlist here: https://www.youtube.com/watch?v=93PE-kStl34&list=PL2mncq0mb-6ibI02KufoaXnZHgNc6G9dO

A list of write-ups for OverTheWire Bandit, a simple Capture The Flag (CTF) game aimed at beginners.

The objective of the game is to solve the challenges and find the password to proceed to the next level.

To get started, the player needs to know how to connect to the server using a Secure Shell (SSH), which is essentially the bread and butter of any information security professional. Fine, probably something essential for any IT professionals to know how to use. 

For an absolute beginner who has not used SSH before, it is never too late to get started. It is time to put on a learning hat and try out the OverTheWire Bandit challenges!

OverTheWire Bandit

While the website itself did mention that the challenges were designed for beginners, it is still pretty fun for IT professionals to challenge themselves.

https://www.youtube.com/watch?v=93PE-kStl34&list=PL2mncq0mb-6ibI02KufoaXnZHgNc6G9dO

List of Write-ups

A review of my past one-year in Information Security

A Review of my past one-year in Information Security

A review of my past one-year in Information Security
A review of my past one-year in Information Security

Last week, I had my one-year anniversary in the Information Security industry, doing work related to the offensive aspect of security. Surprisingly, it has already been a year since I left my previous role from a local bank and pursued my interest in Information Security. Time really flies…

The purpose of this blog is to document my learning journey, but I have neglected it for a few months due to hectic workload from various sources, however, the good news is that I have decided to consciously remind myself to update it more often moving forward! Well, make it a “new year resolution”!

Now, back to the review…

Keep Reading

CTF @ DEFCON 17

Resources for Capture The Flag (CTF) Challenges

This post consists of a list of resources for computer security enthusiasts to learn and prepare for CTF (Capture The Flag) challenges and ethical hacking.

Being someone whom is interested in Capture The Flag (CTF) games and challenges, I always find myself looking at how I can pick up new skills and techniques to add to my arsenal, to utilize them in solving the challenges designed by the creators of the game (or competition such as DEFCON, ROOTCON, and many more).

Capture The Flag (CTF)

For those who are new to this term, CTF are computer security related, hacking kind of game or competitions which generally consist of participants breaking, investigating, reverse engineering and doing anything they can to reach the end goal and capture the “flag”. 

The games are usually categorized in various forms, a non-exhaustive list would consist of Exploit Development, Web Hacking, Reverse Engineering, Packet Capture Analysis, Cryptography, Steganography, Binary Analysis, Mobile Security, and many more others.

Capture The Flag @ DEFCON 17
Image Courtesy: Wikipedia/Capture_the_flag

Just to clear a misconception of CTF: they need not be a competition. They can be Virtual Machines (VM) that you can download from VulnHub. Check out some of the VulnHub write-ups such as the Write-ups for Kioptrix series, Stapler or FristiLeaks.

They can also be free challenges hosted online for users to play them for free, such as OverTheWire. Do also check out the OverTheWire: Bandit Write-up and InfoSec Institute CTF #1: Hacking for n00bz.

CTF Guides 

The following are two pretty good CTF guides and resources websites which I read when I was just starting out. If you are new to CTF or is interested in understanding more about CTF, you can check them out.

  • CTF Guide – Trail of Bits – introduces CTF and covers a few topics, such as vulnerability discovery, exploit creation and forensics
  • CTFs Resources – introduces CTF as well, and covers a few other topics, such as different methods of cryptography, steganography and web hacking