Othmane Moutaouakkil
LinkedInGitHub
  • Introduction
  • OSCP Journey
    • HTB
      • HTB Linux Boxes
      • HTB Windows Boxes
  • Write-Ups
    • TCM Security
      • Practical Ethical Hacking
        • Networking Refresher
        • The Ethical Hacker Methodology
        • Information Gathering (Reconnaissance)
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • New Capstone
        • Active Directory (AD)
          • AD Overview
          • AD Lab Build
          • Attacking AD: Initial Attack Vectors
          • Attacking AD: Post-Compromise Enumeration
          • Attacking AD: Post-Compromise Attacks
          • We've Compromised the Domain - Now What?
          • Additional AD Attacks
          • AD Case Studies
        • Post Exploitation
        • Web Application Enumeration, Revisited
        • Find & Exploit Common Web Vulnerabilities
        • Wireless Penetration Testing
        • Legal Documents and Report Writing
      • Open-Source Intelligence (OSINT)
    • Hacking Challenges
      • OTW
        • Bandit
          • Level 0
          • Level 0 → 1
          • Level 1 → 2
          • Level 2 → 3
          • Level 3 → 4
          • Level 4 → 5
          • Level 5 → 6
          • Level 6 → 7
          • Level 7 → 8
          • Level 8 → 9
          • Level 9 → 10
          • Level 10 → 11
          • Level 11 → 12
          • Level 12 → 13
          • Level 13 → 14
          • Level 14 → 15
          • Level 15 → 16
          • Level 16 → 17
          • Level 17 → 18
          • Level 18 → 19
        • Natas
        • Leviathan
        • Krypton
        • Narnia
        • Behemoth
        • Utumno
        • Maze
        • Vortex
        • Manpage
        • Drifter
        • FormulaOne
      • THM
  • Research
  • Resume
Powered by GitBook
On this page
  • Level Goal
  • Write-Up
  • Lessons Learned

Was this helpful?

  1. Write-Ups
  2. Hacking Challenges
  3. OTW
  4. Bandit

Level 2 → 3

PreviousLevel 1 → 2NextLevel 3 → 4

Last updated 7 months ago

Was this helpful?

Level Goal

The password for the next level is stored in a file called spaces in this filename located in the home directory.

Write-Up

  1. Verify the file's presence in the home directory:

ls

This confirms the existence of a file named spaces in this filename.

  1. Display the content of the file:

cat spaces\ in\ this\ filename

Note: To handle spaces in filenames, you can either use backslashes to escape each space or enclose the entire filename in quotes "".

cat "spaces in this filename"
  1. The revealed password is: MNk8KNH3Usiio41PRUEoDFPqfxLPlSmx

  2. Access the next level using the obtained password:

ssh bandit3@bandit.labs.overthewire.org -p 2220

Enter the password when prompted.

Lessons Learned

  • Filenames can contain spaces

  • Backslashes are used to escape spaces in filenames on the command line

  • Alternative methods like using quotes "" can also be used to handle spaces in filenames

  • Proper handling of special characters in filenames is crucial for file operations

-- Othmane

ls
cat spaces\ in\ this\ filename
cat "spaces in this filename"