Level 18 - Level 19

Challenge Information Platform: OverTheWire (Bandit) Difficulty: Easy Category: Linux Overview The password for the next level is stored in a file readme in the homedirectory. Unfortunately, someone has modified .bashrc to log you out when you log in with SSH. Solution SSH into machine on port 2220 with password from previous level. ssh -p 2220 bandit18@bandit.labs.overthewire.org But when you do you immediately get logged out with bye bye message. What we can do instead is to let SSH run a command instead of opening interactive shell. So we can cat the readme for example. ...

February 19, 2026 · 1 min · 111 words · Ryan Jin

Level 17 - Level 18

Challenge Information Platform: OverTheWire (Bandit) Difficulty: Easy Category: Linux Overview There are 2 files in the homedirectory: passwords.old and passwords.new. The password for the next level is in passwords.new and is the only line that has been changed between passwords.old and passwords.new NOTE: if you have solved this level and see ‘Byebye!’ when trying to log into bandit18, this is related to the next level, bandit19 Solution SSH into machine on port 2220 with credentials from previous level. ...

February 19, 2026 · 1 min · 112 words · Ryan Jin

Level 16 - Level 17

Challenge Information Platform: OverTheWire (Bandit) Difficulty: Easy Category: Linux Overview The credentials for the next level can be retrieved by submitting the password of the current level to a port on localhost in the range 31000 to 32000. First find out which of these ports have a server listening on them. Then find out which of those speak SSL/TLS and which don’t. There is only 1 server that will give the next credentials, the others will simply send back to you whatever you send to it. ...

February 19, 2026 · 2 min · 241 words · Ryan Jin

Level 15 - Level 16

Challenge Information Platform: OverTheWire (Bandit) Difficulty: Easy Category: Linux Overview The password for the next level can be retrieved by submitting the password of the current level to port 30001 on localhost using SSL/TLS encryption. Helpful note: Getting “DONE”, “RENEGOTIATING” or “KEYUPDATE”? Read the “CONNECTED COMMANDS” section in the manpage. Solution SSH into machine on port 2220 with password from previous level. ssh -p 2220 bandit15@bandit.labs.overthewire.org Begin by seeing if port 30001 is open using nmap. ...

February 19, 2026 · 1 min · 172 words · Ryan Jin

Level 14 - Level 15

Challenge Information Platform: OverTheWire (Bandit) Difficulty: Easy Category: Linux Overview The password for the next level can be retrieved by submitting the password of the current level to port 30000 on localhost. Solution SSH into machine on port 2220 with password from previous level. ssh -p 2220 bandit14@bandit.labs.overthewire.org To begin with we can check and see if port 30000 is open and running by using nmap. nmap scans an IP address for open ports and displays information about what services are running on these ports. ...

February 19, 2026 · 1 min · 194 words · Ryan Jin