WarGame/Bandit(35)
-
Bandit - level10 → level11
level10 → level11 ssh bandit10@bandit.labs.overthewire.org -p 2220 pw : truKLdjsbJ5g7yyJ2X2R0o3a5HQJFuLk cat data.txt base64 decode FLAG : IFukwKGsFW8MOq3IRFqrxE1hxTNEbUPR
2021.04.16 -
Bandit - level9 → level10
level9 → level10 ssh bandit9@bandit.labs.overthewire.org -p 2220 pw : UsvVyFSfZZWbi6wgC7dAFyFuR6jQQUhR strings data.txt FLAG : truKLdjsbJ5g7yyJ2X2R0o3a5HQJFuLk
2021.04.14 -
Bandit - level8 → level9
level8 → level9 ssh bandit8@bandit.labs.overthewire.org -p 2220 pw : cvX2JJa4CFALtqS87jk27qwqGhBM9plV cat data.txt | sort 정렬해서 본 후에 혼자 있는 문자열을 찾는다. FLAG : UsvVyFSfZZWbi6wgC7dAFyFuR6jQQUhR
2021.04.12 -
Bandit - level7 → level8
level7 → level8 ssh bandit7@bandit.labs.overthewire.org -p 2220 pw : HKBPTKQnIay4Fw76bEy8PVxKEDQRKTzs cat data.txt | grep millionth FLAG : cvX2JJa4CFALtqS87jk27qwqGhBM9pl
2021.04.12 -
Bandit - level6 → level7
level6 → level7 ssh bandit6@bandit.labs.overthewire.org -p 2220 pw : DXjZPULLxYr17uwoI01bNLQbtFemEgo7 find / -user bandit7 -group bandit6 -size 33c cat /var/lib/dpkg/info/bandit7.password owned by user bandit7 owned by group bandit6 33 bytes in size 위와 같은 조건으로 find 문 사용 권한오류 안뜨는 password 출력 FLAG : HKBPTKQnIay4Fw76bEy8PVxKEDQRKTzs
2021.04.10 -
Bandit - level5 → level6
ssh bandit5@bandit.labs.overthewire.org -p 2220 pw : koReBOKuIDDepwhWk7jZC0RTdopnAYKh cd inhere find -size 1033c cat maybehere07/.file2 pwnable.co.kr,hacking,linux The password for the next level is stored in a file somewhere under the inhere directory and has all of the following properties: human-readable 1033 bytes in size not executable 위와 같은 힌트를 줬으니 사이즈로 find 함수 활용
2021.04.07