After a few months of sporadic work, I finally finished the “Bandit” games on OvertheWire. These are fairly basic challenges where you’re essentially trying to retrieve a hidden password from a Linux VM.

Proof...

LVL 0->1 Password: ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If

LVL 1->2 Password: 263JGJPfgU6LtdEvgfWU1XP5yac29mFx

LVL 2->3 Password: MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx

LVL 3->4 Password: 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ

LVL 4->5 Password: 4oQYVPkxZOOEOO5pTW81FB8j8lxXGUQw

LVL5->6 Password: HWasnPhtq9AVKe0dmk45nxy20cvUa6EG

LVL6->7 Password: morbNTDkSW6jIlUc0ymOdMaLnOlFVAaj

LVL7->8 Password: dfwvzFQi4mU0wfNbFOe9RoWskMLg7eEc

LVL8->9 Password: 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM

LVL9->10 Password: FGUW5ilLVJrxX9kMYMmlN4MgbpfMiqey

LVL10->11 Password: dtR173fZKb0RRsDFSGsg2RWnpNVj3qRr

LVL11->12 Password: 7x16WNeHIi5YkIhWsfFIqoognUTyj9Q4

LVL12->13 Password: FO5dwFsc0cbaIiH0h8J2eUks2vdTDwAn

LVL13->14 Password: MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS

LVL14->15 Password: 8xCjnmgoKbGLhHFAZlGE5Tmu4M2tKJQo

LVL15->16 Password: kSkvUpMQ7lBYyCM4GBPvCvT1BfWRy0Dx

LVL16->17 Password: EReVavePLFHtFlFsjn3hyzMlvSuSAcRD

LVL 17->18 Password: x2gLTTjFwMOhQ8oWNbMN362QKxfRqGlO

LVL 18->19 Password: cGWpMaKXVwDUNgPAVJbWYuGHVn9zl3j8

LVL19->20 Password: 0qXahG8ZjOVMN9Ghs7iOWsCfZyXOUbYO

LVL20->21 Password: EeoULMCra2q0dSkYj561DX7s1CpBuOBt

LVL21->22 Password: tRae0UfB9v0UzbCdn9cY0gQnds9GF58Q

LVL22->23 Password: 0Zf11ioIjMVN551jX3CmStKLYqjk54Ga

LVL23->24 Password: gb8KRRCsshuZXI0tUuR6ypOFjiZbf3G8

LVL24->25 Password: iCi86ttT4KSNe1armKiwbQNmB3YJP3q4

LVL25->26 Password: s0773xxkk0MXfdqOfPRVr9L3jJBUOgCZ

LVL26->27 Password: upsNCc7vzaRDx6oZC6GiR6ERwe1MowGB

LVL27->28 Password: Yz9IpL0sBcCeuG7m9uQFt8ZNpS4HZRcN

LVL28->29 Password: 4pT1t5DENaYuqnqvadYs1oE4QLCdjmJ7

LVL29->30 Password: qp30ex3VLz5MDG1n91YowTv4Q8l7CDZL

LVL30->31 Password: fb5S2xb7bRyFmAvQYQGEqsbhVyJqhnDy

LVL31->32 Password: 3O9RfhqyAlVBEZpVb6LYStshZoqoSx5K

LVL32->33 Password: tQdtbs5D5i2vJwkO8mEyYEyTL8izoeJ0

LVL33->34 Password: COMPLETED

What a great product; I’ve already started working through Natas. It builds on itself, but you can leave a few notes and pick it up/put it down for a while.

There is a certain stickiness to what you learn from working through these small attainable problems. They don’t try and do to much or take massive jumps in difficulty. I would highly recommend these to anyone, even if you’re not interested in cyber security… I mean, what a great way to get familiar with in OS and a command line.