Post

Overthewire Leviathan Level 0

Solution for the Overthewire.org Leviathan level 0

Level Goal

There is no information for this level, intentionally.

Walkthrough

Login to the server using the provided username and password.
username: leviathan0
password: leviathan0

1
ssh leviathan0@leviathan.labs.overthewire.org -p 2223

With no description given first thing we do is check what is in the home directory.

1
2
3
4
5
6
7
8
9
leviathan0@leviathan:~$ ls 
leviathan0@leviathan:~$ ls -al
total 24
drwxr-xr-x  3 root       root       4096 Aug 26  2019 .
drwxr-xr-x 10 root       root       4096 Aug 26  2019 ..
drwxr-x---  2 leviathan1 leviathan0 4096 Aug 26  2019 .backup
-rw-r--r--  1 root       root        220 May 15  2017 .bash_logout
-rw-r--r--  1 root       root       3526 May 15  2017 .bashrc
-rw-r--r--  1 root       root        675 May 15  2017 .profile

ls shows nothing in the home directory.
When we use ls -al to list all files and directories we can now see a directory named .backup.

1
2
3
leviathan0@leviathan:~$ cd .backup/
leviathan0@leviathan:~/.backup$ ls
bookmarks.html

The only thing inside .backup is a html file bookmarks.html.

We can now use grep to search the file for given words.
Grep is used in this format grep <WORD TO BE SEARCHED> <FILE TO BE SEARCH>

1
2
3
4
leviathan0@leviathan:~/.backup$ grep password bookmarks.html
<DT><A HREF="http://leviathan.labs.overthewire.org/passwordus.html | This will be fixed later, the password for leviathan1 is rioG******" ADD_DATE="1155384634" LAST_CHARSET="ISO-8859-1" ID="rdf:#$2wIU71">password to leviathan1</A> 

leviathan0@leviathan:~/.backup$

We can see that searching for the word password found the password for the next challenge.

1
This will be fixed later, the password for leviathan1 is rioG******
This post is licensed under CC BY 4.0 by the author.