OverTheWire Leviathan – Level 3
![overthewire](https://rtmoran.org/app/uploads/2019/05/1_VLXFzVtGx16B1iH81bcTPw.png)
Again, by reviewing the dynamic library calls of the SETUID ELF, level3
, found within user leviathan3
‘s home directory, we can observe another strcmp()
call comparing the inputted password to the accepted value.
![](https://rtmoran.org/app/uploads/2019/05/leviathan4-1024x627.png)
leviathan4 : vuH0coox6m