Exploring OverTheWire: Level 5 to Level 6 - Bandit Challenge

📆 · ⏳ 2 min read · ·

Introduction

As we continue our adventure in the Bandit Challenge, Level 6 ↗️ presents us with a new challenge. Our mission is to locate a file within the “inhere” directory that fulfills certain criteria: it must be human-readable, have a size of 1033 bytes, and not be executable.

Challenge Overview

Level 6 challenges us to search for a specific file within the “inhere” directory.

đź’ˇ

The file we seek must possess the following properties: human-readable, 1033 bytes in size, and not executable.

By using commands such as “ls,” “cd,” “cat,” and “file,” we’ll navigate the file system, examine file attributes, and successfully obtain the password.

Approach and Strategy

Follow these steps to successfully solve Level 6:

Terminal window
ssh [email protected] -p 2220

Enter the password you obtained from the previous level.

Once logged in, navigate to the “inhere” directory using the cd command:

Terminal window
cd inhere

This command will change your working directory to the “inhere” directory.

List the files and directories within the “inhere” directory using the ls command:

Terminal window
ls

This will provide a list of files and directories within the current directory.

To locate the file that meets the given criteria, use the find command along with specific parameters:

Terminal window
find . -type f -readable -size 1033c ! -executable

This command will search for files within the current directory and its subdirectories that are human-readable, have a size of 1033 bytes, and are not executable.

The find command will display the path to the file that meets the given criteria. Make a note of the path.

To view the contents of the file and retrieve the password, use the cat command:

Terminal window
cat <path_to_file>

Replace <path_to_file> with the actual path obtained from the previous step which was ./maybehere07/.file2

The password for Level 6 will be displayed in the output. Take note of it for the next level.

Notes

Conclusion

Congratulations on successfully completing Level 6 of the Bandit Challenge! By exploring the “inhere” directory and locating the file that meets the given properties, we have obtained the password necessary to progress further.

Stay tuned for the next blog post, where we’ll tackle Level 7 and face new challenges in our quest to become proficient cybersecurity practitioners.

You may also like

  • # overthewire

    Exploring OverTheWire: Level 20 to Level 21 - Bandit Challenge

    Welcome back to our captivating journey through the Bandit Challenge! In this blog post, we're geared up to conquer Level 21, where a setuid binary introduces a novel challenge involving network connections. Join me as we delve into the mechanics of connecting to localhost, reading text, and successfully obtaining the password to proceed. Let's dive in!

  • # overthewire

    Exploring OverTheWire: Level 19 to Level 20 - Bandit Challenge

    Welcome back to our thrilling journey through the Bandit Challenge! In this blog post, we're poised to conquer Level 20, where we encounter a setuid binary that holds the key to our progress. Join me as we explore the concept of setuid binaries, learn how to execute them, and successfully uncover the password to continue our journey. Let's dive in!

  • # overthewire

    Exploring OverTheWire: Level 18 to Level 19 - Bandit Challenge

    Welcome back to our riveting journey through the Bandit Challenge! In this blog post, we're set to conquer Level 19, where a password is concealed within a file. However, a clever twist awaits us—someone has tampered with the system to log us out during SSH login. Join me as we navigate through this challenge using commands like ssh, ls, and cat, all while devising strategies to overcome the unexpected hurdle. Let's dive in!