{"id":253,"date":"2014-12-16T02:59:22","date_gmt":"2014-12-16T02:59:22","guid":{"rendered":"http:\/\/scottyrotten.wordpress.com\/?p=253"},"modified":"2022-06-03T05:40:41","modified_gmt":"2022-06-03T05:40:41","slug":"overthewire-bandit-0","status":"publish","type":"post","link":"https:\/\/hackmethod.com\/overthewire-bandit-0\/","title":{"rendered":"OvertheWire &#8211; Bandit 0"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; min_height=&#8221;833px&#8221; custom_padding=&#8221;||48px|||&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]<strong>Background:<\/strong> What is <a class=\"imgScanned\" href=\"http:\/\/overthewire.org\/wargames\/\">Overthewire<\/a>.org? It&#8217;s essentially a bunch of virtual machines you connect to for learning and exercising your mind. It starts off simple with basic operation familiarization and ramps up from to full blown exploitation and cryptography in the higher levels.\u00a0 Buckle up, this is gonna be a fun ride.<\/p>\n<p><!--more--><\/p>\n<p><strong><a class=\"imgScanned\" href=\"http:\/\/overthewire.org\/wargames\/bandit\/bandit0.html\">Bandit Level 0<\/a><\/strong><\/p>\n<h4><strong>Objective:<\/strong><\/h4>\n<p>Connect to the overthewire game server using SSH<\/p>\n<h4><strong>Intel Given:<\/strong><\/h4>\n<ul>\n<li>Hostname: bandit.labs.overthewire.org<\/li>\n<li>Port: 2220<\/li>\n<li>Login: bandit0<\/li>\n<li>Password: bandit0<\/li>\n<\/ul>\n<h4><strong>How to:<\/strong><\/h4>\n<p>This will vary from OS to OS.\u00a0 To use the SSH protocol on Windows you&#8217;ll need some sort of SSH application (client or server) since SSH is not native to Windows.\u00a0 However, when using Linux or MacOS this can be accomplished through the terminal.<\/p>\n<ul>\n<li><strong>Windows<\/strong>: Download <a class=\"imgScanned\" href=\"http:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/download.html\">Putty<\/a> for Windows and follow the many tutorials that can be found online on how to connect to an SSH service.<\/li>\n<li><strong>*nix<\/strong>: from terminal type &#8216;ssh bandit0@bandit.labs.overthewire.org<\/li>\n<\/ul>\n<p>With this knowledge, we can login using the above commands (depending on your OS) and grab the password needed to log into the next level.<\/p>\n<h4><strong>Conclusion:<\/strong><\/h4>\n<p>Some caveats, users may receive a few prompts regarding RSA keys, or a warning that someone may be eavesdropping on them. I encourage users to research further on that topic, for now don&#8217;t be worried.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.7.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-4px|auto||auto||&#8221; custom_padding=&#8221;||20px|||&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/hackmethod.com\/wp-content\/uploads\/2020\/12\/Next-300&#215;64.png&#8221; alt=&#8221;Next&#8221; title_text=&#8221;Next&#8221; url=&#8221;https:\/\/hackmethod.com\/overthewire-bandit-1&#8243; align=&#8221;right&#8221; _builder_version=&#8221;4.7.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background: What is Overthewire.org? It&#8217;s essentially a bunch of virtual machines you connect to for learning and exercising your mind. It starts off simple with basic operation familiarization and ramps up from to full blown exploitation and cryptography in the higher levels.\u00a0 Buckle up, this is gonna be a fun ride. Bandit Level 0 Objective: [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":1454,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<strong>Background:<\/strong> What is <a class=\"imgScanned\" href=\"http:\/\/overthewire.org\/wargames\/\">Overthewire<\/a>.org? It's essentially a bunch of virtual machines you connect to for learning and exercising your mind. It starts off simple with basic operation familiarization and ramps up from to full blown exploitation and cryptography in the higher levels.\u00a0 Buckle up, this is gonna be a fun ride.\n\n<!--more-->\n\n<strong><a class=\"imgScanned\" href=\"http:\/\/overthewire.org\/wargames\/bandit\/bandit0.html\">Bandit Level 0<\/a><\/strong>\n<h4><strong>Objective:<\/strong><\/h4>\nConnect to the overthewire game server using SSH\n<h4><strong>Intel Given:<\/strong><\/h4>\n<ul>\n \t<li>Hostname: bandit.labs.overthewire.org<\/li>\n \t<li>Port: 2220<\/li>\n \t<li>Login: bandit0<\/li>\n \t<li>Password: bandit0<\/li>\n<\/ul>\n<h4><strong>How to:<\/strong><\/h4>\nThis will vary from OS to OS.\u00a0 To use the SSH protocol on Windows you'll need some sort of SSH application (client or server) since SSH is not native to Windows.\u00a0 However, when using Linux or MacOS this can be accomplished through the terminal.\n<ul>\n \t<li><strong>Windows<\/strong>: Download <a class=\"imgScanned\" href=\"http:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/download.html\">Putty<\/a> for Windows and follow the many tutorials that can be found online on how to connect to an SSH service.<\/li>\n \t<li><strong>*nix<\/strong>: from terminal type 'ssh bandit0@bandit.labs.overthewire.org<\/li>\n<\/ul>\nWith this knowledge, we can login using the above commands (depending on your OS) and grab the password needed to log into the next level.\n<h4><strong>Conclusion:<\/strong><\/h4>\nSome caveats, users may receive a few prompts regarding RSA keys, or a warning that someone may be eavesdropping on them. I encourage users to research further on that topic, for now don't be worried.","_et_gb_content_width":"1080","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[44],"tags":[43,45,46],"class_list":["post-253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-overthewire","tag-bandit","tag-overthewire","tag-tutorials"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/09\/bandit-mask-clip-art-cowboy-bandit-vector.jpg?fit=300%2C300&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5zY4D-45","_links":{"self":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":19,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":27458,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/253\/revisions\/27458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media\/1454"}],"wp:attachment":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}