# Trainer ## Level 1 SSH with the username `level0` and password `level0` ## Level 2 Switch user to level1 with the password you found `943430e07fd566bc96aa05fca3c96e48` ## Level 3 `2cadca6148093c403d82396252b8c4db` ## Level 4 ## Level 5 ## Level 6 ## Level 7 ## Level 8 ## Level 9 Run strings on the binary ## Level 10 ## Level 11 `192` ## Level 12 ## Level 13 We can see `mysecret` has a SUID bit `f4736e1eb28b1d9055c5f5d58a49b5a6` ## Level 14 `0ea027e3835aa87a4a47465321c5fe75` ## Level 15 Since kernel version is `4.19.0-12` password is `4.19` ## Level 16 Linux Distro is `Debian` so this will be our password ## Level 17 Aliases are saved in `.bashrc` ## Level 18 ## Level 19 ## Level 20 Here we can see id_rsa key for user `level20` ## Level 21 ## Level 22