../

OverTheWire - Bandit: Level 16 to Level 17


Similar to the task before, but now we have to transmit it using SSL Encryption:

The password for the next level can be retrieved by submitting the password of the current level to port 30001 on localhost using SSL encryption.

Helpful note: Getting “HEARTBEATING” and “Read R BLOCK”? Use -ign_eof and read the “CONNECTED COMMANDS” section in the manpage. Next to ‘R’ and ‘Q’, the ‘B’ command also works in this version of that command…

1$ openssl s_client -crlf -connect localhost:30001 -noservername
2<ssl connection output>
3$ jN2kgmIXJ6fShzhT2avhotn4Zcka6tnt
4Correct!
5JQttfApK4SeyHwDlI9SXGR50qclOAil1

The openssl s_client is like netcat but for ssl connection. This way a connection is established and we can send our current password to receive the next one.

Kategorien: #/writeups/; #/overthewire/

Tags: #/security/; #/hacking/; #/bash/; #/linux/; #/ctf/