OverTheWire Leviathan — Complete Walkthrough Index
OverTheWire Leviathan — Complete Walkthrough Index
Halloo SuiiKawaii dessu!! Glad to see you again 💖
This page is the master index for my Leviathan walkthroughs — basically your fast-track guide for every level from 0 → 7.

If Bandit was a Linux bootcamp 🐧 and Krypton was cipherland 🔐, then Leviathan is your first step into the world of binary exploitation lite: poking weird executables, abusing SUID bits, and tricking sloppy programs until they spill their secrets.
So buckle up — it’s pain, suffer, sanity-burning… but 100% worth it 🗡️🐉🔥.
Introduction
If you want to explore binary challenges without diving straight into hardcore pwn, Leviathan is perfect. Here you’ll practice:
- Spotting and abusing SUID binaries
- Recon with
strings,ltrace,strace,file,ldd - Password discovery, config leaks, symlink tricks
- Temp file abuse & sloppy file handling

By the end, you’ll be way more comfortable poking at executables like a hacker scientist 🧪.
About This Series
Each level has its own post with:
- Login Info — how to connect for that level
- Task — the original OTW description or screenshot
- Theory — short notes on the concept (SUID, path hijack, etc.)
- Solution — step-by-step walkthrough with reasoning
I don’t just drop passwords — I show why things work, so you can reuse the tricks in CTFs or real assessments.
How to Play Leviathan (and actually learn)
- List everything:
ls -la,find . -type f -o -type d - Probe binaries:
file,strings,ldd,ltrace,strace - Check SUID/SGID:
find / -perm -4000 -type f 2>/dev/null - Try inputs: environment variables, symlinks, relative paths, weird filenames
- Take notes: commands, outputs, dead ends
Golden rule: if a binary runs setuid, your inputs (filenames, env, PATH) might be your exploit surface.
Levels Index (0 → 7)
Each link opens in a new tab. The one-liner gives you the main trick.
-
🐣 Level 0 — SSH Login
Read post → — First login & warm-up recon. -
🔍 Level 0 → 1 — Hidden Files & Backups
Read post → — Hunt creds in world-readable backups/configs. -
🧵 Level 1 → 2 —
stringsSaves the Day
Read post → — Inspect SUID binary; find hardcoded checks. -
🔗 Level 2 → 3 — Path & Symlink Shenanigans
Read post → — Trick the binary into reading your file. -
🧪 Level 3 → 4 —
ltrace/straceRecon
Read post → — Watch library calls & extract compared strings. -
🔑 Level 4 → 5 — Weak Auth Logic
Read post → — Abuse a broken password check. -
📦 Level 5 → 6 — Temp Files & Loot
Read post → — World-readable temp files FTW. -
🧰 Level 6 → 7 — SUID + Shell Escapes
Read post → — Escape restricted tools into a shell.
Conclusion
Leviathan teaches you to treat binaries as puzzles. Instead of panicking at an unknown executable, you’ll calmly check its type, peek inside with strings, trace its calls, and then break it open.
Finishing Leviathan feels like leveling up from “shell user” to “binary tinkerer” 🔧:
- You can quickly triage SUID binaries.
- You know how to spy on program logic with tracing tools.
- You’ve seen how tiny mistakes in code = game over.
Next adventures:
Keep tinkering, keep breaking (legally!), and most of all — keep notes. You got this 💪
Thanks for reading!
Until next time — Otsumachi!! 💖☄️✨
