Menu

Leviathan

October 12, 2016 - OverTheWire.org

This wargame doesn’t require any knowledge about programming – just a bit of common
sense and some knowledge about basic *nix commands. We had no idea that it’d be this
hard to make an interesting wargame that wouldn’t require programming abilities from
the players. Hopefully we made an interesting challenge for the new ones.

Leviathan’s levels are called leviathan0, leviathan1, … etc. and can be accessed on leviathan.labs.overthewire.org through SSH.

To login to the first level use:

Username: leviathan0
Passowrd: leviathan0

Data for the levels can be found in the homedirectories. You can look at /etc/leviathan_pass for the various level passw

Level 0 – search for text in a file

Username: leviathan0
Password: leviathan0
URL: ssh leviathan0@leviathan.labs.overthewire.org

leviathan0@melinda:~$ ls -la
total 24
drwxr-xr-x   3 root       root       4096 Nov 14  2014 .
drwxr-xr-x 172 root       root       4096 Jul 10 14:12 ..
drwxr-x---   2 leviathan1 leviathan0 4096 Aug  8 23:10 .backup
-rw-r--r--   1 root       root        220 Apr  9  2014 .bash_logout
-rw-r--r--   1 root       root       3637 Apr  9  2014 .bashrc
-rw-r--r--   1 root       root        675 Apr  9  2014 .profile
leviathan0@melinda:~$ cd .backup
leviathan0@melinda:~/.backup$ ls -la
total 140
drwxr-x--- 2 leviathan1 leviathan0   4096 Aug  8 23:10 .
drwxr-xr-x 3 root       root         4096 Nov 14  2014 ..
-rw-r----- 1 leviathan1 leviathan0 133259 Nov 14  2014 bookmarks.html
leviathan0@melinda:~/.backup$ nano bookmarks.html 
leviathan0@melinda:~/.backup$ cat bookmarks.html  | grep password
<DT><A HREF="http://leviathan.labs.overthewire.org/passwordus.html | This will be fixed later, the password for leviathan1 is rioGegei8m" ADD_DATE="1155384634" LAST_CHARSET="ISO-8859-1" ID="rdf:#$2wIU71">password to leviathan1</A>

Level 1 – ltrace, bash, cat

Username: leviathan1
Password: rioGegei8m
URL: ssh leviathan1@leviathan.labs.overthewire.org

leviathan1@melinda:~$ ls -la
total 28
drwxr-xr-x   2 root       root       4096 Nov 14  2014 .
drwxr-xr-x 172 root       root       4096 Jul 10 14:12 ..
-rw-r--r--   1 root       root        220 Apr  9  2014 .bash_logout
-rw-r--r--   1 root       root       3637 Apr  9  2014 .bashrc
-rw-r--r--   1 root       root        675 Apr  9  2014 .profile
-r-sr-x---   1 leviathan2 leviathan1 7493 Nov 14  2014 check
leviathan1@melinda:~$ ./check
password: aa
Wrong password, Good Bye ...
leviathan1@melinda:~$ ltrace ./check
__libc_start_main(0x804852d, 1, 0xffffd654, 0x80485f0 <unfinished ...>
printf("password: ")                                       = 10
getchar(0x8048680, 47, 0x804a000, 0x8048642password: 
)               = 10
getchar(0x8048680, 47, 0x804a000, 0x8048642
)               = 10
getchar(0x8048680, 47, 0x804a000, 0x8048642
)               = 10
strcmp("\n\n\n", "sex")                                    = -1
puts("Wrong password, Good Bye ..."Wrong password, Good Bye ...
)                       = 29
+++ exited (status 0) +++
leviathan1@melinda:~$ ./check
password: sex
$ cat  /etc/leviathan_pass/leviathan2                                
ougahZi8Ta

Level 2 –

Username: leviathan2
Password: ougahZi8Ta
URL: ssh leviathan2@leviathan.labs.overthewire.org