OverTheWire Leviathan — Complete Walkthrough Index
OverTheWire Leviathan — Complete Walkthrough Index
Halloo SuiiKawaii dessu!! Glad to see you again 💖
This page is the master index for my Leviathan walkthroughs — basically your fast-track guide for every level from 0 → 7.
If Bandit was a Linux bootcamp 🐧 and Krypton was cipherland 🔐, then Leviathan is your first step into the world of binary exploitation lite: poking weird executables, abusing SUID bits, and tricking sloppy programs until they spill their secrets.
So buckle up — it’s pain, suffer, sanity-burning… but 100% worth it 🗡️🐉🔥.
Introduction
If you want to explore binary challenges without diving straight into hardcore pwn, Leviathan is perfect. Here you’ll practice:
- Spotting and abusing SUID binaries
- Recon with
strings
,ltrace
,strace
,file
,ldd
- Password discovery, config leaks, symlink tricks
- Temp file abuse & sloppy file handling
By the end, you’ll be way more comfortable poking at executables like a hacker scientist 🧪.
About This Series
Each level has its own post with:
- Login Info — how to connect for that level
- Task — the original OTW description or screenshot
- Theory — short notes on the concept (SUID, path hijack, etc.)
- Solution — step-by-step walkthrough with reasoning
I don’t just drop passwords — I show why things work, so you can reuse the tricks in CTFs or real assessments.
How to Play Leviathan (and actually learn)
- List everything:
ls -la
,find . -type f -o -type d
- Probe binaries:
file
,strings
,ldd
,ltrace
,strace
- Check SUID/SGID:
find / -perm -4000 -type f 2>/dev/null
- Try inputs: environment variables, symlinks, relative paths, weird filenames
- Take notes: commands, outputs, dead ends
Golden rule: if a binary runs setuid, your inputs (filenames, env, PATH) might be your exploit surface.
Levels Index (0 → 7)
Each link opens in a new tab. The one-liner gives you the main trick.
-
🐣 Level 0 — SSH Login
Read post → — First login & warm-up recon. -
🔍 Level 0 → 1 — Hidden Files & Backups
Read post → — Hunt creds in world-readable backups/configs. -
🧵 Level 1 → 2 —
strings
Saves the Day
Read post → — Inspect SUID binary; find hardcoded checks. -
🔗 Level 2 → 3 — Path & Symlink Shenanigans
Read post → — Trick the binary into reading your file. -
🧪 Level 3 → 4 —
ltrace
/strace
Recon
Read post → — Watch library calls & extract compared strings. -
🔑 Level 4 → 5 — Weak Auth Logic
Read post → — Abuse a broken password check. -
📦 Level 5 → 6 — Temp Files & Loot
Read post → — World-readable temp files FTW. -
🧰 Level 6 → 7 — SUID + Shell Escapes
Read post → — Escape restricted tools into a shell.
Conclusion
Leviathan teaches you to treat binaries as puzzles. Instead of panicking at an unknown executable, you’ll calmly check its type, peek inside with strings
, trace its calls, and then break it open.
Finishing Leviathan feels like leveling up from “shell user” to “binary tinkerer” 🔧:
- You can quickly triage SUID binaries.
- You know how to spy on program logic with tracing tools.
- You’ve seen how tiny mistakes in code = game over.
Next adventures:
Keep tinkering, keep breaking (legally!), and most of all — keep notes. You got this 💪
Thanks for reading!
Until next time — Otsumachi!! 💖☄️✨