# Trainer
## Level 1
SSH with the username `level0` and password `level0`
## Level 2
Switch user to level1 with the password you found
`943430e07fd566bc96aa05fca3c96e48`
## Level 3
`2cadca6148093c403d82396252b8c4db`
## Level 4
## Level 5
## Level 6
## Level 7
## Level 8
## Level 9
Run strings on the binary
## Level 10
## Level 11
`192`
## Level 12
## Level 13
We can see `mysecret` has a SUID bit
`f4736e1eb28b1d9055c5f5d58a49b5a6`
## Level 14
`0ea027e3835aa87a4a47465321c5fe75`
## Level 15
Since kernel version is `4.19.0-12` password is `4.19`
## Level 16
Linux Distro is `Debian` so this will be our password
## Level 17
Aliases are saved in `.bashrc`
## Level 18
## Level 19
## Level 20
Here we can see id_rsa key for user `level20`
## Level 21
## Level 22