This is an old revision of the document!
Guided exploration of the Linux server command line.
|When||Tue August 20th 2019, 6:30pm|
|Where||The Avalon Lounge, Kent Road|
Informal and relaxed meeting in the quiet lounge of Avalon bar on Kent Road. You'll need a laptop to take part (but feel free to just observe if you'd prefer).
Aimed at absolute beginners. We'll show how to securely connect to a server then we'll work through Bandit, an adventure game set in the command line that progresses step-by-step from the basics to common programs and beyond.
I'll have my laptop plugged into a screen and we'll work together to introduce to you to each concept. Bring a laptop and play along as I explain how to progress to each level.
See how far you get before you come along and try on the night: http://overthewire.org/wargames/bandit/
This event is free, but there will be a [completely optional] donation jar to cover the costs of the meetup group.
If you are on Windows, then download PuTTY, otherwise you probably already have the tools you'll need built in (ssh).
Game instructions: http://overthewire.org/wargames/bandit/
The goal of this level is for you to log into the game using SSH. The host to which you need to connect is bandit.labs.overthewire.org, on port 2220. The username is bandit0 and the password is bandit0. Once logged in, go to the Level 1 page to find out how to beat Level 1.
The password for the next level is stored in a file called
readme located in the home directory. Use this password to log into bandit1.labs.overthewire.org using SSH. Whenever you find a password for a level, use SSH (on port 2220) to log into that level and continue the game.
Continue with the instructions online at http://overthewire.org/wargames/bandit/
I'll post any passwords/command line hints here as we progress if you are having trouble.
ssh -p 2220 email@example.com
There will be some passwords posted on the IRC channel (#opensource on irc.glasgow.social) if you need them.
There is a log of the chat you've missed available here: https://starflyer.armchairscientist.co.uk/tmp/opensource.log.txt