../
OverTheWire - Bandit: Level 16 to Level 17
Similar to the task before, but now we have to transmit it using SSL Encryption:
The password for the next level can be retrieved by submitting the password of the current level to port 30001 on localhost using SSL encryption.
Helpful note: Getting “HEARTBEATING” and “Read R BLOCK”? Use -ign_eof and read the “CONNECTED COMMANDS” section in the manpage. Next to ‘R’ and ‘Q’, the ‘B’ command also works in this version of that command…
1 $ openssl s_client -crlf -connect localhost:30001 -noservername
2 <ssl connection output>
3 $ jN2kgmIXJ6fShzhT2avhotn4Zcka6tnt
4 Correct!
5 JQttfApK4SeyHwDlI9SXGR50qclOAil1
The openssl s_client
is like netcat but for ssl connection. This way a connection is established and we can send our current password to receive the next one.