Training / OverTheWire / Bandit / bandit10
# bandit10
> ssh bandit10@bandit.labs.overthewire.org -p 2220
>
> The password for the next level is stored in the file **data.txt**, which contains base64 encoded data
Alrighty, so we know that the file contains base64 encoded data, so lets verify that quickly.
```
bandit10@bandit:~$ cat data.txt
VGhlIHBhc3N3b3JkIGlzIGR0UjE3M2ZaS2IwUlJzREZTR3NnMlJXbnBOVmozcVJyCg==
```
The biggest tell that this is base64 encoded data is the trailing equal signs, which base64 encoding uses to get the string to a standard size if it is too short. To decode this we'll need to introduce the `base64` command.
## base64
```
NAME
base64 - base64 encode/decode data and print to standard output
SYNOPSIS
base64 [OPTION]... [FILE]
DESCRIPTION
Base64 encode or decode FILE, or standard input, to standard output.
With no FILE, or when FILE is -, read standard input.
Mandatory arguments to long options are mandatory for short options too.
-d, --decode
decode data
```
*Taken from the man page for base64*
This is all we're going to need in order to solve this level. Using `base64` with the flag `-d` for decode we can figure out what the password is.
```
bandit10@bandit:~$ base64 -d data.txt
The password is {removed in accordance with game rules}
```