0% found this document useful (0 votes)
50 views12 pages

Itcy481 Lab1

Uploaded by

Ahmad A Mstarehy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views12 pages

Itcy481 Lab1

Uploaded by

Ahmad A Mstarehy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

University of Bahrain

College of Information Technology

ITCY481

Lab 1:

Name: Ahmed Ayoob Ali


ID:202110232
Requirements for each level:
• Screenshot
• Description:
o what is the challenge about?
o how did you solve it?
o what is the flag?

LEVEL 0

• log into the game using ' ssh ' command .


• using ' ssh ' command to connect to the server with '
[email protected] -p 2220 ' witch specify the username=level-
number and the server and the port number.
• bandit0
LEVEL 0→1
• read the content of the file 'readme' that is contain the password for the next level
• first I list all the files by using 'ls' and then read the file 'readme' by cat command
• ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If
LEVEL 1→2

• read the content of the file ' - ' that is contain the password for the next level
• first I list all the files by using 'ls' and then read the file ' - ' by 'cat' command with
specifying the fie name within the directory by ' ./"file name" '
• 263JGJPfgU6LtdEvgfWU1XP5yac29mFx
LEVEL 2→3

• read the content of the file ' spaces in this filename ' that is contain the password
for the next level
• first I list all the files by using 'ls' and then read the file ' spaces in this filename '
by 'cat' command but the file name should be inside " " because it contain spaces
• MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
LEVEL 3→4
• read the content of the file ' …Hiding-From-You ' that is contain the password for
the next level but in another directory.
• first I list all the files by using 'ls' and then navigate to the directory 'inhere'. By
listing the files in 'inhere' I cant see anything and that is because the file we need
is hidden. To solve this I listed all files in more detailed info including the hidden
files by ' ls -alsp '
• 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
LEVEL 4→5
• find which file is human-readable then read it.
• After navigating to ' inhere ' directory. I listed ten files then I use 'file' command to
know the type of a file. But since the number of the files is little larger, I use ' file
./-file* ' to list all files type due to all files have the same pattern. Then read the
ASCII file that contains the password
• 4oQYVPkxZOOEOO5pTW81FB8j8lxXGUQw
LEVEL 5→6
• find file within specefic features (readable, size=1033 bytes and not executable).
• After navigating to ' inhere ' directory. I listed all files then I used 'find' command
to find the files with the given features since the number of the files is larger.
• HWasnPhtq9AVKe0dmk45nxy20cvUa6EG
LEVEL 6→7
• find file within specific features (owner name, group name and size).
• I star searching for the file from the root directory since the hint on the website
Sayed " stored somewhere on the server " and adding the file features by this
command ' find / -user bandit7 -group bandit6 -size 33c '.then I fund a lot of files
with ' permission denied '.so I researched again but by adding ' 2</dev/null ' to
the find command to redirects any error messages (like permission denied) to
/dev/null to suppress them.
• morbNTDkSW6jIlUc0ymOdMaLnOlFVAaj

LEVEL 7→8
• search for the line that contains ' millionth ' in the data.txt file .
• After opening ' data.txt ' file. I used 'grep' command to search for the line that
contain ' millionth '.
• dfwvzFQi4mU0wfNbFOe9RoWskMLg7eEc
LEVEL 8→9

• search for the line that occurred once (unique).


• After opening ' data.txt ' file. I used ' sort ' to sort all the lines alphabetically with
adding ' | uniq -u ' to show only the lines that appear one time.
• 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM
LEVEL 9→10

• find key in the file where it has some human readable data.
• I use "strings" to identify human-readable text within the file then use "grep" to
locate instances of the "==" character..
• FGUW5ilLVJrxX9kMYMmlN4MgbpfMiqey
LEVEL 10→11
• decode the ' data.txt ' file to get the password.
• I used ' base64 -d data.txt ' to decode the base64 data.txt, to get the password.
• dtR173fZKb0RRsDFSGsg2RWnpNVj3qRr

level Password
LEVEL 0 bandit0
LEVEL 0→1 ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If

LEVEL 1→2 263JGJPfgU6LtdEvgfWU1XP5yac29mFx


LEVEL 2→3 MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx
LEVEL 3→4 2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ
LEVEL 4→5 4oQYVPkxZOOEOO5pTW81FB8j8lxXGUQw
LEVEL 5→6 HWasnPhtq9AVKe0dmk45nxy20cvUa6EG
LEVEL 6→7 morbNTDkSW6jIlUc0ymOdMaLnOlFVAaj
LEVEL 7→8 dfwvzFQi4mU0wfNbFOe9RoWskMLg7eEc
LEVEL 8→9 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM
LEVEL 9→10 FGUW5ilLVJrxX9kMYMmlN4MgbpfMiqey
LEVEL 10→11 dtR173fZKb0RRsDFSGsg2RWnpNVj3qRr

You might also like