I have been daily driving linux for quite some time (nvim + tmux + arch setup) and know my way around the shell, but I honestly enjoyed this way too much lol. Great to see such premium content for free!
Downvoted, because on the difficult levels (26->27 and 32->33) it is obvious that the speaker tries to recreate the solution from memory, without showing how one would come to it, and what are the false leads that exist. Also, a good teacher would explain multiple solutions where they exist. On 26->27, while reading the manual of "more", he conveniently skips the "!" key, which is designed to execute the commands. Of course it doesn't work, but a proper teacher would demonstrate this non-solution too, and explain why it doesn't work. Here the explanation is that "more" uses $SHELL to run the commands (via the "-c" option), and bandit26's weird shell does not provide this possibility, and there is no possibility to override it. Therefore we need to search for alternatives, and in this case, the alternative is to escape to vim and try running commands there. Again, a proper teacher who demonstrates the thought process, as opposed to just the attempt to reproduce the memorized solution, would first show the obvious way to execute commands or shell from vim - e.g. by googling "vim execute command" (again, pointing to "!", which doesn't work), "vim override shell" (leads to stackoverflow with ":set shell"). This is also a good opportunity to showcase the built-in vim help, e.g. by running ":help shell" (which also mentions the "shell" option that can be set). On 32-> 33, the jump from the inability to use lower-case letters to positional arguments is also not explained at all. Here is how I did it. My first idea was to find a useful command that uses only upper-case characters, in /usr/bin and /usr/sbin. "ls /usr/bin/[A-Z]* /usr/sbin/[A-Z]*" however yields nothing useful, and so another idea would be to use special characters or digits, these are not mangled. Metacharacters like "*" only allow us to run another copy of the uppercase shell, which is not useful. Octal escapes, like $'\167'? Sorry, no - these work in bash only, not in sh. Try to run $SHELL? No, this again refers to the uppercase shell. Try to make "sh" out of the existing variables, as guessed by observing what other bandits see? Tried, doesn't work: A=${SHELL%???} B=${A##*/?????} $B # Nope (actually shell variables do not persist between lines, but I wouldn't hope that the participant will discover this) A=${SHELL%???} ; B=${A##*/?????} ; $B # Works (and is a different solution than presented) - but, as I said, not really guessable Try to import "/bin/sh" as a value of one of the environment variables permitted by ssh? OTW_HACK=/bin/sh ssh -o SendEnv=OTW_HACK -p 2220 bandit32@bandit.labs.overthewire.org $OTW_HACK ...yay, works (and is a different solution than presented). Amusingly, when /bin/bash is smuggled this way, this gets us to the home of bandit33, not bandit32, because of the special setuid handling in bash. And then explain $0. Explain, instead of just demonstrating, that, in a shell that doesn't run a script, it is documented to expand to the shell name.
thanks for your well explained video! Can I ask one question? What is the difference between a .hidden and …hiding from you? Cause when I try to solve level 3 it keep getting …hiding from you
Hey folks! 🌟 While this video is a great starting point, let's not forget to put on our research hats 🕵♂🕵♀ and dig a little deeper! First, a huge shoutout to the creators for their relentless dedication to our community - you guys rock! 🙌 However, I have to say that some of the solutions here, particularly for Level 11, had me scratching my head 🤔. For example, suggesting an external website for the rot13 algorithm does not feel right. The “tr” command with the right options could do the trick just as well, and hey, don’t forget about our trusty sidekick "man"-your best friend in a pinch! 💡 Let's keep exploring and learning together! ✨
Every time he logs into the shell the game states it's rules. Two times it is: "DON'T POST SPOILER'S.". To explain a possible solution is one thing. But you should never post or show the Flag.
He’s helping people who have no type of knowledge in penetration testing and using kali which is what that war game is directed to he’s just trying to help because a person who has no knowledge doesn’t even know what a ssh is or what it does
I have been daily driving linux for quite some time (nvim + tmux + arch setup) and know my way around the shell, but I honestly enjoyed this way too much lol. Great to see such premium content for free!
Yoooo I clicked with the speed of light
For guidance
IG
@Jesse00134
Wow😮 please create more courses like this.💯
Just got my cybersecurity certifications
I’m glad for this type of content
Downvoted, because on the difficult levels (26->27 and 32->33) it is obvious that the speaker tries to recreate the solution from memory, without showing how one would come to it, and what are the false leads that exist. Also, a good teacher would explain multiple solutions where they exist.
On 26->27, while reading the manual of "more", he conveniently skips the "!" key, which is designed to execute the commands. Of course it doesn't work, but a proper teacher would demonstrate this non-solution too, and explain why it doesn't work. Here the explanation is that "more" uses $SHELL to run the commands (via the "-c" option), and bandit26's weird shell does not provide this possibility, and there is no possibility to override it. Therefore we need to search for alternatives, and in this case, the alternative is to escape to vim and try running commands there. Again, a proper teacher who demonstrates the thought process, as opposed to just the attempt to reproduce the memorized solution, would first show the obvious way to execute commands or shell from vim - e.g. by googling "vim execute command" (again, pointing to "!", which doesn't work), "vim override shell" (leads to stackoverflow with ":set shell"). This is also a good opportunity to showcase the built-in vim help, e.g. by running ":help shell" (which also mentions the "shell" option that can be set).
On 32-> 33, the jump from the inability to use lower-case letters to positional arguments is also not explained at all. Here is how I did it. My first idea was to find a useful command that uses only upper-case characters, in /usr/bin and /usr/sbin. "ls /usr/bin/[A-Z]* /usr/sbin/[A-Z]*" however yields nothing useful, and so another idea would be to use special characters or digits, these are not mangled. Metacharacters like "*" only allow us to run another copy of the uppercase shell, which is not useful. Octal escapes, like $'\167'? Sorry, no - these work in bash only, not in sh. Try to run $SHELL? No, this again refers to the uppercase shell. Try to make "sh" out of the existing variables, as guessed by observing what other bandits see? Tried, doesn't work:
A=${SHELL%???}
B=${A##*/?????}
$B # Nope (actually shell variables do not persist between lines, but I wouldn't hope that the participant will discover this)
A=${SHELL%???} ; B=${A##*/?????} ; $B # Works (and is a different solution than presented) - but, as I said, not really guessable
Try to import "/bin/sh" as a value of one of the environment variables permitted by ssh?
OTW_HACK=/bin/sh ssh -o SendEnv=OTW_HACK -p 2220 bandit32@bandit.labs.overthewire.org
$OTW_HACK
...yay, works (and is a different solution than presented). Amusingly, when /bin/bash is smuggled this way, this gets us to the home of bandit33, not bandit32, because of the special setuid handling in bash.
And then explain $0. Explain, instead of just demonstrating, that, in a shell that doesn't run a script, it is documented to expand to the shell name.
I suggest you take the Linux Commands crash course from FCC if you're new to the command line: ua-cam.com/video/ZtqBQ68cfJc/v-deo.html
Gracias bro
very good , could you pls do natas next , i really like your explanation 👍👍
proud to see that , a bengali guy is making skilled tutorials !! i am inspired man !
thanks for your well explained video! Can I ask one question? What is the difference between a .hidden and …hiding from you? Cause when I try to solve level 3 it keep getting …hiding from you
Great bro, it's great seeing you growing.
There is no readme.txt in the home dir.
Please reach out to 'George Hotz' for teaching 'vortex', he does it really good!
That "What the hell" got me in level27. I had the exact reaction lol
Thank you so much 🥰❤️ for this video, it's really helpful. I wish you will make more videos on cybersecurity
Im confused already, , 3.5 mins in lol
Hey folks! 🌟 While this video is a great starting point, let's not forget to put on our research hats 🕵♂🕵♀ and dig a little deeper!
First, a huge shoutout to the creators for their relentless dedication to our community - you guys rock! 🙌
However, I have to say that some of the solutions here, particularly for Level 11, had me scratching my head 🤔.
For example, suggesting an external website for the rot13 algorithm does not feel right. The “tr” command with the right options could do the trick just as well, and hey, don’t forget about our trusty sidekick "man"-your best friend in a pinch! 💡
Let's keep exploring and learning together! ✨
cant login now! permission denied...
We have to use our terminal like ( WSL ) if we are on windows ? Or it's with a online editor ?
You ssh into a server where you run the commands. If you're on windows it's the same since you're logged into a linux server somewhere else
Honestly can say that this is the best place to learn in-depth Linux commands. Highly recommended!
Very interesting topic
You could say that it's useless to remember but ggg?G used in vim allow a rot13 on the whole text file!
how did you leave the rsafile
You are spoiling the CTF...
people copying pasting flags won't go any further compared to the one who genuinely digged out the flag.
Thank you for this because i was getting that the password did not work. I had to but the password at the begining before the @.. i'm in
how do you open the page on the left
Thanks🌹
Way to go bro Sachi 👍🙏🇮🇳🚩
INDIANS are killing it
hey can you plz always add a blog mentioning dependencies and software installs so that it could work offline
thank you for all :]
thank you making this video begineer friendly
Where's the timestamp????????
Wow impressive ,now I know what should I learn
cool bro, this content is pure gold
does anybody know what site i can use to write the commands
Thanks for the video guid, pal! It was cool
IZLEDIM
Do more videos like theseee pleaseeee!!!!!
please I'm getting Bad port 'bandit0'
Hi everyone and code camp,
Can I play this game for a MAC laptop?
cheers
yeah you can
You are F>.....king AWESOME
Proud of you bro❤️
Interesting
Awesome
Just a comment to boost the signal 👍
Memories bring back the old time days
No surprise. But great content!
Thank you so much.
all part of the scooping up of potential enemies. :D
Don’t trust this site looks sketchy.
Can you do math syll d full syll
This is some cool stuff, thx
Which ssh editor is this
Love ur work man
Every time he logs into the shell the game states it's rules. Two times it is: "DON'T POST SPOILER'S.". To explain a possible solution is one thing. But you should never post or show the Flag.
He’s helping people who have no type of knowledge in penetration testing and using kali which is what that war game is directed to he’s just trying to help because a person who has no knowledge doesn’t even know what a ssh is or what it does
Exactly and every person it's responsible for how to use it.@@ghost_breezy8749
nice
HTB as well please
Thank you!
Awesome brother ❤️
great work bro
Thanks!
jajajajajjaaja 😂🤣😅
Don’t trust it.