This repository contains my progress through the OverTheWire Bandit wargame. All passwords and flags are stored locally in bandit-flags.txt and are NOT committed to version control.
OverTheWire Bandit is a wargame designed to teach Linux command-line skills and basic security concepts. The game consists of 33 levels, each requiring you to find a password to access the next level.
bandit-flags.txt- Local file containing passwords (DO NOT COMMIT)evidence/- Screenshots and proof of completionsessions/- Session logs and notes (DO NOT COMMIT)README.md- This file
- Level 0 → 1 — SSH +
cat readme(learned: remote login & basic file read) — evidence:evidence/level0-1.png - Level 1 → 2 — Special filename
-trick:cat ./-(learned: stdin vs filename) — evidence:evidence/level1-2.png - Level 2 → 3 — Used
ls -laandfileto locate readable file (learned: hidden files & file types) — evidence:evidence/level2-3.png - Level 3 → 4 — Used
findandfileto inspect candidates, thencatthe human-readable file — evidence:evidence/level3-4.png - Level 4 → 5 — Searched
inhere/for human-readable file of specific size usingfind+file(learned: handling weird filenames) — evidence:evidence/level4-5.png - Level 5 → 6 — Inspected nested dirs in
inhere/and usedfile/caton the text file found — evidence:evidence/level5-6.png - Level 6 → 7 — Used
findto match file properties (size/ownership) and printed the matching file — evidence:evidence/level6-7.png - Level 7 → 8 — Located file using ownership/group filters and
findthencatto read contents — evidence:evidence/level7-8.png - Level 8 → 9 — Used
findto search by owner/group/size and then displayed the 33-byte file — evidence:evidence/level8-9.png - Level 9 → 10 — Extracted printable strings from binary (
strings data.txt) and grepped for==patterns — evidence:evidence/level9-10.png - Level 10 → 11 — Cleaned and decoded Base64 (
tr -cd ... | base64 -d) then inspected decoded output — evidence:evidence/level10-11.png - Level 11 → 12 — (placeholder) Completed level — used relevant
file/strings/findcommands per hint — evidence:evidence/level11-12.png
- Connect to each level using SSH:
ssh [email protected] -p 2220 - Find the password for the current level
- Add the password to
bandit-flags.txt(LOCAL ONLY) - Take a screenshot and save it in
evidence/ - Update this README with your progress
- NEVER commit passwords or flags to version control
- All sensitive information is in
.gitignore - This repository is for tracking progress and learning, not for sharing solutions