Skip to content

Commit d510060

Browse files
committed
upto level 15
Signed-off-by: ayushka11 <[email protected]>
1 parent 8664974 commit d510060

File tree

5 files changed

+82
-0
lines changed

5 files changed

+82
-0
lines changed

level11.md

+10
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
## **level11**
2+
3+
the cipher `ROT13` rotates all letters by 13 characters.
4+
5+
we use the `tr` command to translate letters.
6+
eg. `tr 'a' 'z'` converts all a's to z's.
7+
8+
`cat data.txt | tr '[A-Za-z]' '[N-ZA-Mn-za-m]'` this command would reverse the rot13 cipher.
9+
10+
save the psswd and exit.

level12.md

+35
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
## **level12**
2+
3+
we first copy the data file to /tmp using below `mkdir`, `cd`, `cp` commands.
4+
5+
`mkdir /tmp/ayu`
6+
`cd /tmp/ayu`
7+
`cp ~/data.txt .`
8+
9+
using `xxd -r data.txt data` to reverse the hexdump.
10+
11+
we use `file data` to see that this file is a gzip compressed file.
12+
13+
we need to rename and decompress it.
14+
15+
`mv data data.gz && gzip -d data.gz`, mv to rename and gzip -d to decompress.
16+
17+
we use `file data` to see that it is a bzip2 archive.
18+
19+
using `bzip2 -d data` to decompress this.
20+
21+
`file data.out` to see that it is again a gz archive.
22+
23+
`mv data.out data.gz && gzip -d data.gz`, same command as above but with different file name.
24+
25+
`ls` to see that it contains a file data
26+
27+
`file data`
28+
output - `data: POSIX tar archive (GNU)`
29+
30+
these files have extension .tar and can be decompressed using `tar -xvf filename`, repeating these steps until we reach a file with ascii text.
31+
32+
cat the output, save the psswd and exit.
33+
34+
35+

level13.md

+11
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
## **level13**
2+
3+
`cat sshkey.private` to see the ssh key.
4+
5+
copy the key and change the permissions using below cmd.
6+
7+
`chmod 600 sshkey.private`
8+
9+
now, login to bandit14 using the key
10+
11+
`ssh -i key [email protected] -p 2220`

level14.md

+14
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
## **level14**
2+
3+
`nc` command is used for reading, writing and redirecting data across networks.
4+
5+
the psswd is in `/etc/bandit_pass/bandit14` file, so we `cat` it to get the psswd.
6+
7+
now, using the `nc` cmd to connect a remote server.
8+
9+
`nc 127.0.0.1 30000`
10+
11+
enter the psswd here.
12+
13+
you get the psswd for level15, save it and exit.
14+

level15.md

+12
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
## **level15**
2+
3+
we try connecting to localhost at 30001 using openssl
4+
5+
`openssl s_client -connect localhost:30001`
6+
7+
The s_client command implements a generic SSL/TLS client which connects to a remote host using SSL/TLS.
8+
9+
then, we paste the prev psswd to get the new one.
10+
11+
save the psswd and exit.
12+

0 commit comments

Comments
 (0)