BanditOverTheWire

Bandit29

Website URL: http://overthewire.org/wargames/bandit/bandit29.html

Let’s log into the server as bandit28

Fig. 1

The task is as follows:

There is a git repository at ssh://bandit28-git@localhost/home/bandit28-git/repo. The password for the user bandit28-git is the same as for the user bandit28.
Clone the repository and find the password for the next level.

This level is identical to the previous level ( here ). As was done there, we can create a working directory, clone the repository.

mkdit /tmp/bandit29solving2018
cd /tmp/bandit29solving2018
git clone ssh://bandit28-git@localhost/home/bandit28-git/repo
Fig. 2

Now, let’s try the same steps as before, see what’s there in the files of the repo.

Fig. 3

Umm, it seems this time, the password isn’t directly stored in the README.md. At least not in the one we see. Since it’s a github repository, let’s see it’s history.

git log
Fig. 4

So, there have been changes made in this file. Particularly, the commit 073c27c130e6ee407e12faad1dd3848a110c4f95 by Morla Porla caught my attention. The message states “fix info leak”, let’s try finding out what the info leak was.

Since it refers to the last commit, this should be pretty easy.

git show HEAD
Fig. 5

Mission accomplished!

Leave a Reply

Your email address will not be published. Required fields are marked *