File tree 5 files changed +82
-0
lines changed
5 files changed +82
-0
lines changed Original file line number Diff line number Diff line change
1
+ ## ** level11**
2
+
3
+ the cipher ` ROT13 ` rotates all letters by 13 characters.
4
+
5
+ we use the ` tr ` command to translate letters.
6
+ eg. ` tr 'a' 'z' ` converts all a's to z's.
7
+
8
+ ` cat data.txt | tr '[A-Za-z]' '[N-ZA-Mn-za-m]' ` this command would reverse the rot13 cipher.
9
+
10
+ save the psswd and exit.
Original file line number Diff line number Diff line change
1
+ ## ** level12**
2
+
3
+ we first copy the data file to /tmp using below ` mkdir ` , ` cd ` , ` cp ` commands.
4
+
5
+ ` mkdir /tmp/ayu `
6
+ ` cd /tmp/ayu `
7
+ ` cp ~/data.txt . `
8
+
9
+ using ` xxd -r data.txt data ` to reverse the hexdump.
10
+
11
+ we use ` file data ` to see that this file is a gzip compressed file.
12
+
13
+ we need to rename and decompress it.
14
+
15
+ ` mv data data.gz && gzip -d data.gz ` , mv to rename and gzip -d to decompress.
16
+
17
+ we use ` file data ` to see that it is a bzip2 archive.
18
+
19
+ using ` bzip2 -d data ` to decompress this.
20
+
21
+ ` file data.out ` to see that it is again a gz archive.
22
+
23
+ ` mv data.out data.gz && gzip -d data.gz ` , same command as above but with different file name.
24
+
25
+ ` ls ` to see that it contains a file data
26
+
27
+ ` file data `
28
+ output - ` data: POSIX tar archive (GNU) `
29
+
30
+ these files have extension .tar and can be decompressed using ` tar -xvf filename ` , repeating these steps until we reach a file with ascii text.
31
+
32
+ cat the output, save the psswd and exit.
33
+
34
+
35
+
Original file line number Diff line number Diff line change
1
+ ## ** level13**
2
+
3
+ ` cat sshkey.private ` to see the ssh key.
4
+
5
+ copy the key and change the permissions using below cmd.
6
+
7
+ ` chmod 600 sshkey.private `
8
+
9
+ now, login to bandit14 using the key
10
+
11
+ ` ssh -i key [email protected] -p 2220 `
Original file line number Diff line number Diff line change
1
+ ## ** level14**
2
+
3
+ ` nc ` command is used for reading, writing and redirecting data across networks.
4
+
5
+ the psswd is in ` /etc/bandit_pass/bandit14 ` file, so we ` cat ` it to get the psswd.
6
+
7
+ now, using the ` nc ` cmd to connect a remote server.
8
+
9
+ ` nc 127.0.0.1 30000 `
10
+
11
+ enter the psswd here.
12
+
13
+ you get the psswd for level15, save it and exit.
14
+
Original file line number Diff line number Diff line change
1
+ ## ** level15**
2
+
3
+ we try connecting to localhost at 30001 using openssl
4
+
5
+ ` openssl s_client -connect localhost:30001 `
6
+
7
+ The s_client command implements a generic SSL/TLS client which connects to a remote host using SSL/TLS.
8
+
9
+ then, we paste the prev psswd to get the new one.
10
+
11
+ save the psswd and exit.
12
+
You can’t perform that action at this time.
0 commit comments