Welcome aboard! This series is here to help you not just use Linux, but really understand and appreciate the way the Linux/Unix world is designed. The Bandit challenges were originally built for cybersecurity learners, but theyβre just as powerful for anyone starting out in DevOps.
Think of them as fun puzzles that teach you the mindset behind the command line.
—
π How to Use This Guide
- Primary learning: Start with the documentation and practice using the DigiSpidey Linux Command Tutor. Thatβs where the real learning happens.
- Secondary support: These walkthrough posts are here as backup. Dip into them only if youβre stuck or want to see the reasoning behind a solution.
- The goal: Not just to βget the answer,β but to understand why each command works and build confidence with Linux step by step.
—
Bandit in the DigiSpidey Curriculum
Bandit challenges are woven right into the DigiSpidey Linux Foundation Course. During the first week of DevOps training, they act as extra practice β reinforcing the basics like navigation, permissions, search tools, and overall commandβline fluency. In other words, Bandit is where theory turns into muscle memory.
—
Bandit Challenge Levels
π Play Bandit at OverTheWire
Hereβs the full list of levels. Each headline highlights the core skill, and once walkthroughs are published, youβll be able to click through for detailed guidance:
- Level 0 β 1: SSH into the server β Read walkthrough
- Level 1 β 2: Read a file in the home directory β Read walkthrough
- Level 2 β 3: File with special characters in its name β Read walkthrough
- Level 3 β 4: Hidden file in a directory β Read walkthrough
- Level 4 β 5: File with humanβreadable content β Read walkthrough
- Level 5 β 6: Find a file with specific properties β Read walkthrough
- Level 6 β 7: Search for a file owned by a user/group β Read walkthrough
- Level 7 β 8: Search for a unique string in a file β Read walkthrough
- Level 8 β 9: File with repeated characters β Read walkthrough
- Level 9 β 10: File with specific size and permissions β Read walkthrough
- Level 10 β 11: Base64 encoded file β Read walkthrough
- Level 11 β 12: ROT13 encoded file β Read walkthrough
- Level 12 β 13: Hex dump to binary β Read walkthrough
- Level 13 β 14: Private SSH key login β Read walkthrough
- Level 14 β 15: Netcat connection β Read walkthrough
- Level 15 β 16: SSL connection β Read walkthrough
- Level 16 β 17: Port scanning with Nmap β Read walkthrough
- Level 17 β 18: Diff two files β Read walkthrough
- Level 18 β 19: Hidden password in a file β Read walkthrough
- Level 19 β 20: Setuid binary execution β Read walkthrough
- Level 20 β 21: Netcat listener β Read walkthrough
- Level 21 β 22: Cron job analysis β Read walkthrough
- Level 22 β 23: Cron job with script β Read walkthrough
- Level 23 β 24: Cron job with password file β Read walkthrough
- Level 24 β 25: Brute force SSH login β Read walkthrough
- Level 25 β 26: Restricted shell escape β Read walkthrough
- Level 26 β 27: SSH key and shell escape β Read walkthrough
- Level 27 β 28: Git repository clone β Read walkthrough
- Level 28 β 29: Git commit inspection β Read walkthrough
- Level 29 β 30: Git tag inspection β Read walkthrough
- Level 30 β 31: Git branch inspection β Read walkthrough
- Level 31 β 32: Git cherryβpick β Read walkthrough
- Level 32 β 33: Bash tricks with environment β Read walkthrough
- Level 33 β 34: Final password retrieval β Read walkthrough
—
π Closing Note
Think of Bandit as a journey through the Linux landscape. Each level builds on the last, teaching you not just commands but the Unix way of problemβsolving. Use these posts as companions, not crutches β and most importantly, enjoy the process of discovery. The more you experiment, the more natural Linux will feel.