This repository contains solutions to the OverTheWire wargames, a series of challenges designed to teach and practice security concepts in an engaging, hands-on manner. Each wargame focuses on different aspects of cybersecurity, ranging from basic command-line skills to advanced exploitation techniques.
SPOLIER WARNING: It is HIGHLY suggested to try to find you own solutions and avoid spoiling the game for yourself or other if you can help it. Navigating this repository will give away solutions, so navigate it responsibly.
OverTheWire offers a collection of wargames that serve as practical exercises to learn and practice security concepts. These games are structured in levels, each presenting unique challenges that require problem-solving and critical thinking. They cover a wide range of topics, including basic Linux commands, cryptography, and binary exploitation.
The recommended progression through the wargames is:
- Bandit: Aimed at absolute beginners, Bandit teaches the basics needed to play other wargames.
- Leviathan, Natas, or Krypton: These wargames delve into topics like binary analysis, web security, and cryptography, respectively.
- Narnia: Focuses on basic exploitation techniques, providing source code for each level to facilitate learning.
- Behemoth: Addresses common coding mistakes such as buffer overflows, race conditions, and privilege escalation.
- Utumno and Maze: Present more advanced challenges, requiring a deeper understanding of security concepts.
Each wargame is accessible via SSH, with specific connection details provided on their respective pages. Keep in mind that every game uses a different SSH port.
The repository is organized into directories corresponding to each wargame. Within each directory, you'll find Bash scripts containing the necessary commands to solve the corresponding level.
- Begin by cloning this repository to your local machine:
git clone https://github.com/GiatrasKon/OverTheWire-Wargames-Solutions.git
- Navigate to the directory of the wargame you're interested in, e.g.:
cd Bandit
- Review its contents to understand the commands and execute them. Observe the output and understand each step involved in solving the level. This will enhance your learning experience and deepen your comprehension of the underlying concepts.
These scripts are intended for educational purposes only. It's crucial to understand each command and its implications before execution. Always practice ethical hacking and ensure you have proper authorization before attempting to access or modify any system or data. By using these scripts, you agree that you understand the risks involved and take full responsibility for any actions taken.