Leviathan Walkthrough

The Leviathan is a series of challenges for testing your ability to solve basic security-related problems. You have to gain access to different levels of a system by finding and exploiting vulnerabilities. Only a simple overview of programming, networking, and security concepts is needed to navigate its levels.

Intro and Level 0

This game is much shorter than The Bandit. As such, tis write up is only a couple of pages. The second level is perhapss, by a large margin, the most challenging and rewarding. Most of the puzzles can be solved by becoming familiar with the programs strace and ltrace.

I also took a different approach for these notes and also keeping record of all the actions that led me nowhere.

Strong man reading is a must. While playing this game I stumbled upon this article: RTFM!. It ceirtainly helped me level up my understanding of the UNIX documentation layout…

Level 00 write-up

This is a very simple level that only relies on the user’s ability with basic commands. Having already completed at least some of the Bandit or used a UNIX system for enough time to know what a hidden file/folder is, and how to use grep is enough to solve it.

You basically need to scavenge the home folder for the password string.

Levels

  • As usual, you should login using your ssh client. Of course performing a quick inspection of ~ is mandatory. You should find a setuid binary file, owned by …

  • A quick inspection portrays a puzzle very similar to the previous one. A binary file that runs with elevated permissions. $ ./printfile *** File Printer *** Usage: …