🚀
v13vv/GitBook
🚀
v13vv/GitBook
  • 🌌About this blog
  • The Author
    • v13vv
  • 2025
    • TryHackMe
    • HackTheBox
    • TheCyberMentor
    • PNPT
    • CPTS
    • AZ-500
  • 2024
    • CTFs
      • idekCTF 2024
        • misc/NM~~PZ~~ - easy
      • 🐭Bandit - OverTheWire
        • Bandit 0
        • Bandit 1 ( level 0->1 )
        • Bandit 2 ( level 1->2 )
        • Bandit 3 ( level 2->3 )
        • Bandit 4 ( level 3->4 )
        • Bandit 5 ( level 4->5 )
      • 🐯Natas - OverTheWire
        • Natas 0
        • Natas 1 ( level 0->1 )
        • Natas 2 ( level 1->2 )
        • Natas 3 ( level 2->3 )
    • Security+ Labs
      • ⛑️CompTIA Security+ - 101Labs.net
        • Lab 41 – Getting a reverse shell on a server through a file upload
        • Lab 42 – Manual privilege escalation using python
    • WEB SECURITY
      • 🍊Web Security Academy - PortSwigger
        • Burp Suite Setup on Kali Linux
        • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
        • Lab: SQL injection vulnerability allowing login bypass
        • Lab: Reflected XSS into HTML context with nothing encoded
    • NETWORKING
      • 🌊Wireshark Labs - Jim Kurose Homepage
        • Getting Started
    • POST-QUANTUM CRYPTOGRAPHY
      • A Study of Algorithms Development for Post-Quantum Cryptography
        • NIST Post-Quantum Cryptography Standardization
          • Call for Proposals in Security Aspect
          • Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process
          • KEM / Digital Signature
            • Kyber
              • What is Kyber ?
                • Module Learning With Errors (M-LWE)
              • Kyber Cryptanalysis
                • Timing Attack
Powered by GitBook
On this page
  • Level Goal
  • Commands you may need to solve this level
  • Solving
  1. 2024
  2. CTFs
  3. Bandit - OverTheWire

Bandit 4 ( level 3->4 )

PreviousBandit 3 ( level 2->3 )NextBandit 5 ( level 4->5 )

Last updated 9 months ago

Level Goal

The password for the next level is stored in a hidden file in the inhere directory.

Commands you may need to solve this level

Solving

In this level, we'll be dealing with hidden files.

ssh into bandit3:

ssh -p 2220 bandit3@bandit.labs.overthewire.org

From the img1, The problem we're dealing with in this level is that the ls command by itself can't show us all of the files. The problem is easily solved by adding -a option to the ls command:

ls -a

The -a command tells the ls to show us all of the files inside the directory, including the hidden ones. Anyway you can find more option of the ls command by using command ls --help or man ls.

We captured our flag.

2WmrDFRmJIq3IPxneAaMGhap0pFhF3NJ

, , , , ,

🐭
ls
cd
cat
file
du
find
OverTheWire: Level Goal
Logo
img1
FLAG !