Avatar
Part time CTF Player learn every day!!
🌠 I Love Hoshimachi Suisei!! 🌠
🌠 I Love Hoshimachi Suisei!! 🌠

OverTheWire Leviathan — Complete Walkthrough Index

OverTheWire Leviathan — Complete Walkthrough Index

Halloo SuiiKawaii dessu!! Glad to see you again 💖
This page is the master index for my Leviathan walkthroughs — basically your fast-track guide for every level from 0 → 7.

Sui placeholder

If Bandit was a Linux bootcamp 🐧 and Krypton was cipherland 🔐, then Leviathan is your first step into the world of binary exploitation lite: poking weird executables, abusing SUID bits, and tricking sloppy programs until they spill their secrets.

So buckle up — it’s pain, suffer, sanity-burning… but 100% worth it 🗡️🐉🔥.


Introduction

If you want to explore binary challenges without diving straight into hardcore pwn, Leviathan is perfect. Here you’ll practice:

  • Spotting and abusing SUID binaries
  • Recon with strings, ltrace, strace, file, ldd
  • Password discovery, config leaks, symlink tricks
  • Temp file abuse & sloppy file handling

Leviathan cover placeholder

By the end, you’ll be way more comfortable poking at executables like a hacker scientist 🧪.


About This Series

Each level has its own post with:

  1. Login Info — how to connect for that level
  2. Task — the original OTW description or screenshot
  3. Theory — short notes on the concept (SUID, path hijack, etc.)
  4. Solution — step-by-step walkthrough with reasoning

I don’t just drop passwords — I show why things work, so you can reuse the tricks in CTFs or real assessments.


How to Play Leviathan (and actually learn)

  1. List everything: ls -la, find . -type f -o -type d
  2. Probe binaries: file, strings, ldd, ltrace, strace
  3. Check SUID/SGID: find / -perm -4000 -type f 2>/dev/null
  4. Try inputs: environment variables, symlinks, relative paths, weird filenames
  5. Take notes: commands, outputs, dead ends

Golden rule: if a binary runs setuid, your inputs (filenames, env, PATH) might be your exploit surface.


Levels Index (0 → 7)

Each link opens in a new tab. The one-liner gives you the main trick.

  • 🐣 Level 0 — SSH Login
    Read post → — First login & warm-up recon.

  • 🔍 Level 0 → 1 — Hidden Files & Backups
    Read post → — Hunt creds in world-readable backups/configs.

  • 🧵 Level 1 → 2 — strings Saves the Day
    Read post → — Inspect SUID binary; find hardcoded checks.

  • 🔗 Level 2 → 3 — Path & Symlink Shenanigans
    Read post → — Trick the binary into reading your file.

  • 🧪 Level 3 → 4 — ltrace/strace Recon
    Read post → — Watch library calls & extract compared strings.

  • 🔑 Level 4 → 5 — Weak Auth Logic
    Read post → — Abuse a broken password check.

  • 📦 Level 5 → 6 — Temp Files & Loot
    Read post → — World-readable temp files FTW.

  • 🧰 Level 6 → 7 — SUID + Shell Escapes
    Read post → — Escape restricted tools into a shell.


Conclusion

Leviathan teaches you to treat binaries as puzzles. Instead of panicking at an unknown executable, you’ll calmly check its type, peek inside with strings, trace its calls, and then break it open.

Finishing Leviathan feels like leveling up from “shell user” to “binary tinkerer” 🔧:

  • You can quickly triage SUID binaries.
  • You know how to spy on program logic with tracing tools.
  • You’ve seen how tiny mistakes in code = game over.

Next adventures:

Keep tinkering, keep breaking (legally!), and most of all — keep notes. You got this 💪


Thanks for reading!

Until next time — Otsumachi!! 💖☄️✨

Cinema

all tags

GOT-overwrite aboutme aead ai alphanumeric-shellcode apt argc0 argon2 aslr assembly asymmetric atoi automation backbox bandit base64 bash beginner behemoth binary binary-exploitation binary-to-ascii blackarch blind blind-sqli blogging blue-team bruteforce buffer-overflow buffer-overwrite c caesar canary capabilities checksec command-injection commonmark cookie cron crypto cryptography ctf cutter cyberchef cybersecurity defenders detection dev directory-traversal dnf docs drifter ecc education elf env envp exploitation finale forensics format-string formulaone frequency frequency-analysis gcc gdb getchar gfm ghidra github-pages governance gpg guide hashing hkdf http jekyll jmpbuf kali kasiski kdf kernel keylength kramdown krypton lab ld_preload leviathan lfi lfsr linux linux-syscall llmops log-poisoning ltrace manpage markdown maze memcpy mitigations mitmproxy mlops narnia natas networking newline-injection nonce nop-sled nx object-injection obsidian openssl osint overflow overthewire package-manager pacman parrot path path-hijacking pathname php pie pkc pki pointer-trick pqc priv-esc privilege-escalation provable-security pwn pwntools pyshark python race-condition radare2 rag randomness recon red-team redirect relro requests ret2env ret2libc reverse-engineering reversing ricing roadmap rop rot13 rsa scapy security seed seo serialization session setjmp-longjmp setuid shell shellcode smoke soc sockets sprintf sql-injection srop stack-canary stack-overflow strace strcmp strcpy streamcipher strings strncpy strtoul substitution suid suisei symlink symmetric terminal test threat-intel time-based tls troubleshooting tshark type-juggling ubuntu udp utumno vigenere virtualbox virtualization vmware vortex walkthrough web windows wireshark writing wsl x86
dash theme for Jekyll by bitbrain made with