Level 13¶
Objectives¶
- SSH to user
bandit12
- Read the password from file
data.txt
which is a hexdump of a file that has been repeatedly compressed.
Objective 1¶
- Username:
bandit12
- Password:
5Te8Y4drgCRfCx8ugdwuEX8KFC6k2EUu
- Port:
2220
- IP/Hostname:
bandit.labs.overthewire.org
user@localhost:~$ ssh -p 2220 [email protected]
Objective 2¶
OverTheWire suggests we copy the file to /tmp to work.
bandit12@bandit:~$ mkdir /tmp/dirwalk
bandit12@bandit:~$ cp data.txt /tmp/dirwalk/
bandit12@bandit:~$ cd /tmp/dirwalk
We need to revert the hexdump and push the output to a file.
bandit12@bandit:/tmp/dirwalk$ xxd -r data.txt > data.1
You will need use file
and rename (mv
) the file appropriately.
- gzip = .gz
- bzip2 = bz2
- tar = .tar
You will need to decompress each file type with the appropraite command.
- gzip = gunzip
- bzip2 = bunzip2
- tar = tar xf
After you have finished with your file
and your decompress commands, you will finall have your ASCII text.
bandit12@bandit:/tmp/dirwalk$ cat data8
The password is 8ZjyCRiBWFYkneahHwxCv3wb2a1ORpYL