Exploring OverTheWire: Level 9 to Level 10 - Bandit Challenge

📆 · ⏳ 2 min read · ·

Introduction

As we continue our progress in the Bandit Challenge, Level 10 ↗️ presents us with a new challenge. Our objective is to find a password hidden within the “data.txt” file, where the password is encoded as a human-readable string preceded by several ’=’ characters.

Challenge Overview

đź’ˇ

Level 10 challenges us to search for a password within the “data.txt” file. The password is encoded as a human-readable string preceded by several ’=’ characters. We need to identify the relevant strings, decode them, and extract the password.

By using commands like grep, strings, and tr we’ll search for the strings, manipulate the output, and successfully obtain the password.

Approach and Strategy

Follow these steps to successfully solve Level 10:

Terminal window
ssh [email protected] -p 2220

Enter the password you obtained from the previous level.

To search for the password within the “data.txt” file, where it is preceded by several ’=’ characters, use the following command:

Terminal window
strings data.txt | grep "=="

The strings command extracts human-readable strings from the file, and the grep "==" command filters out strings containing ’==’.

The output of the command will display the lines containing the relevant strings. Examine the output to identify the line that contains the password. The output will be something like this

Terminal window
4========== the#
========== password
========== is
========== G7w8LIi6J3kTb8A7j9LgrywtEUlyyp6s

Take note of the password for the next level.

Notes

  • The grep command is useful for searching for specific patterns within files.
  • Use the strings ↗️ command to extract human-readable strings from binary files.
  • Observe the output and identify the relevant strings based on the given criteria.

Conclusion

Congratulations on successfully completing Level 10 of the Bandit Challenge! By searching for the password within the “data.txt” file, encoded as a human-readable string preceded by several ’=’ characters, we have obtained the necessary password to progress further.

Stay tuned for the next blog post, where we’ll tackle Level 11 and face new challenges in our quest to become proficient cybersecurity practitioners.

You may also like

  • Exploring OverTheWire: Level 20 to Level 21 - Bandit Challenge

    Welcome back to our captivating journey through the Bandit Challenge! In this blog post, we're geared up to conquer Level 21, where a setuid binary introduces a novel challenge involving network connections. Join me as we delve into the mechanics of connecting to localhost, reading text, and successfully obtaining the password to proceed. Let's dive in!

  • Exploring OverTheWire: Level 19 to Level 20 - Bandit Challenge

    Welcome back to our thrilling journey through the Bandit Challenge! In this blog post, we're poised to conquer Level 20, where we encounter a setuid binary that holds the key to our progress. Join me as we explore the concept of setuid binaries, learn how to execute them, and successfully uncover the password to continue our journey. Let's dive in!

  • Exploring OverTheWire: Level 18 to Level 19 - Bandit Challenge

    Welcome back to our riveting journey through the Bandit Challenge! In this blog post, we're set to conquer Level 19, where a password is concealed within a file. However, a clever twist awaits us—someone has tampered with the system to log us out during SSH login. Join me as we navigate through this challenge using commands like ssh, ls, and cat, all while devising strategies to overcome the unexpected hurdle. Let's dive in!