Over The Wire
After a few months of sporadic work, I finally finished the “Bandit” games on OvertheWire. These are fairly basic challenges where you’re essentially trying to retrieve a hidden password from a Linux VM.
Proof...
LVL 0->1 Password: ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
LVL 1->2 Password: 263JGJPfgU6LtdEvgfWU1XP5yac29mFx
LVL 2->3 Password: MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
LVL 3->4 Password: 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
LVL 4->5 Password: 4oQYVPkxZOOEOO5pTW81FB8j8lxXGUQw
LVL5->6 Password: HWasnPhtq9AVKe0dmk45nxy20cvUa6EG
LVL6->7 Password: morbNTDkSW6jIlUc0ymOdMaLnOlFVAaj
LVL7->8 Password: dfwvzFQi4mU0wfNbFOe9RoWskMLg7eEc
LVL8->9 Password: 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM
LVL9->10 Password: FGUW5ilLVJrxX9kMYMmlN4MgbpfMiqey
LVL10->11 Password: dtR173fZKb0RRsDFSGsg2RWnpNVj3qRr
LVL11->12 Password: 7x16WNeHIi5YkIhWsfFIqoognUTyj9Q4
LVL12->13 Password: FO5dwFsc0cbaIiH0h8J2eUks2vdTDwAn
LVL13->14 Password: MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS
LVL14->15 Password: 8xCjnmgoKbGLhHFAZlGE5Tmu4M2tKJQo
LVL15->16 Password: kSkvUpMQ7lBYyCM4GBPvCvT1BfWRy0Dx
LVL16->17 Password: EReVavePLFHtFlFsjn3hyzMlvSuSAcRD
LVL 17->18 Password: x2gLTTjFwMOhQ8oWNbMN362QKxfRqGlO
LVL 18->19 Password: cGWpMaKXVwDUNgPAVJbWYuGHVn9zl3j8
LVL19->20 Password: 0qXahG8ZjOVMN9Ghs7iOWsCfZyXOUbYO
LVL20->21 Password: EeoULMCra2q0dSkYj561DX7s1CpBuOBt
LVL21->22 Password: tRae0UfB9v0UzbCdn9cY0gQnds9GF58Q
LVL22->23 Password: 0Zf11ioIjMVN551jX3CmStKLYqjk54Ga
LVL23->24 Password: gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8
LVL24->25 Password: iCi86ttT4KSNe1armKiwbQNmB3YJP3q4
LVL25->26 Password: s0773xxkk0MXfdqOfPRVr9L3jJBUOgCZ
LVL26->27 Password: upsNCc7vzaRDx6oZC6GiR6ERwe1MowGB
LVL27->28 Password: Yz9IpL0sBcCeuG7m9uQFt8ZNpS4HZRcN
LVL28->29 Password: 4pT1t5DENaYuqnqvadYs1oE4QLCdjmJ7
LVL29->30 Password: qp30ex3VLz5MDG1n91YowTv4Q8l7CDZL
LVL30->31 Password: fb5S2xb7bRyFmAvQYQGEqsbhVyJqhnDy
LVL31->32 Password: 3O9RfhqyAlVBEZpVb6LYStshZoqoSx5K
LVL32->33 Password: tQdtbs5D5i2vJwkO8mEyYEyTL8izoeJ0
LVL33->34 Password: COMPLETED
What a great product; I’ve already started working through Natas. It builds on itself, but you can leave a few notes and pick it up/put it down for a while.
There is a certain stickiness to what you learn from working through these small attainable problems. They don’t try and do to much or take massive jumps in difficulty. I would highly recommend these to anyone, even if you’re not interested in cyber security… I mean, what a great way to get familiar with in OS and a command line.