Othmane Moutaouakkil
LinkedInGitHub
  • Introduction
  • OSCP Journey
    • HTB
      • HTB Linux Boxes
      • HTB Windows Boxes
  • Write-Ups
    • TCM Security
      • Practical Ethical Hacking
        • Networking Refresher
        • The Ethical Hacker Methodology
        • Information Gathering (Reconnaissance)
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • New Capstone
        • Active Directory (AD)
          • AD Overview
          • AD Lab Build
          • Attacking AD: Initial Attack Vectors
          • Attacking AD: Post-Compromise Enumeration
          • Attacking AD: Post-Compromise Attacks
          • We've Compromised the Domain - Now What?
          • Additional AD Attacks
          • AD Case Studies
        • Post Exploitation
        • Web Application Enumeration, Revisited
        • Find & Exploit Common Web Vulnerabilities
        • Wireless Penetration Testing
        • Legal Documents and Report Writing
      • Open-Source Intelligence (OSINT)
    • Hacking Challenges
      • OTW
        • Bandit
          • Level 0
          • Level 0 → 1
          • Level 1 → 2
          • Level 2 → 3
          • Level 3 → 4
          • Level 4 → 5
          • Level 5 → 6
          • Level 6 → 7
          • Level 7 → 8
          • Level 8 → 9
          • Level 9 → 10
          • Level 10 → 11
          • Level 11 → 12
          • Level 12 → 13
          • Level 13 → 14
          • Level 14 → 15
          • Level 15 → 16
          • Level 16 → 17
          • Level 17 → 18
          • Level 18 → 19
        • Natas
        • Leviathan
        • Krypton
        • Narnia
        • Behemoth
        • Utumno
        • Maze
        • Vortex
        • Manpage
        • Drifter
        • FormulaOne
      • THM
  • Research
  • Resume
Powered by GitBook
On this page
  • Level Goal
  • Write-Up
  • Lessons Learned

Was this helpful?

  1. Write-Ups
  2. Hacking Challenges
  3. OTW
  4. Bandit

Level 8 → 9

PreviousLevel 7 → 8NextLevel 9 → 10

Last updated 7 months ago

Was this helpful?

Level Goal

The password for the next level is stored in the file data.txt and is the only line of text that occurs only once

Write-Up

  1. List the content of the current directory:

ls

This confirms the presence of the data.txt file.

  1. Display the content of the data.txt file:

cat data.txt
  1. Search for the line of text that occurs only once:

sort data.txt | uniq -u
  • sort data.txt: Sorts the lines alphabetically

  • |: Pipes the output to the next command

  • uniq -u: Filters for unique lines

The password retrieved: 4CKMh1JI91bUIZZPXDqGanal4xvAg0JM

  1. Access the next level:

ssh bandit9@bandit.labs.overthewire.org -p 2220

Enter the password when prompted.

Lessons Learned

  • The sort command is useful for organizing data for further processing

  • uniq -u filters for lines that appear only once in the input

  • Piping commands together can create powerful data processing workflows

  • Sometimes finding unique information requires multiple steps of data manipulation

-- Othmane

ls
cat data.txt
sort data.txt | uniq -u