ssh bandit15@bandit.labs.overthewire.org -p 2220
#jN2kgmIXJ6fShzhT2avhotn4Zcka6tnt
The password for the next level can be retrieved by submitting the password of the current level to port 30001 on localhost using SSL encryption.
Helpful note: Getting “HEARTBEATING” and “Read R BLOCK”? Use -ign_eof and read the “CONNECTED COMMANDS” section in the manpage. Next to ‘R’ and ‘Q’, the ‘B’ command also works in this version of that command…다음 수준의 암호는 SSL 암호화를 사용하여 로컬 호스트의 포트 30001에 현재 수준의 암호를 제출하여 검색할 수 있습니다.
openssl s_client -connect 도메인:포트openssl s_client -connect localhost:30001
#jN2kgmIXJ6fShzhT2avhotn4Zcka6tnt
#Correct!
#JQttfApK4SeyHwDlI9SXGR50qclOAil1