OverTheWire: Bandit Level 32

S.P.
SecTTP
Published in
1 min readMar 28, 2019

--

http://overthewire.org/wargames/bandit/bandit33.html

Level Goal

After all this git stuff its time for another escape. Good luck!

Use ssh to login the server with the following information.

  • Username: bandit32
  • Password: 56a9bf19c63d650ce78e6ec0354ee45e
  • Host: bandit.labs.overthewire.org
  • Port: 2220
$ ssh bandit32@bandit.labs.overthewire.org -p 2220
This is a OverTheWire game server. More information on http://www.overthewire.org/wargames
bandit32@bandit.labs.overthewire.org's password:
56a9bf19c63d650ce78e6ec0354ee45e

Let’s find the password for the next level.

WELCOME TO THE UPPERCASE SHELL
>> ls
sh: 1: LS: not found
>> LS
sh: 1: LS: not found

The shell converts every command into uppercase. We need to fix it and gain the normal shell again. Since this is an interactive shell, we have the chance to execute it again using the variable $0 .

>> $0$ pwd
/home/bandit32
$ ls -al *
-rwsr-x--- 1 bandit33 bandit32 7556 Oct 16 14:00 uppershell
$ cat /etc/bandit_pass/bandit33
c9c3199ddf4121b10cf581a98d51caee

Got it!

--

--