Lessons Learned using nmap to scan for available ports and services, then using openssl s_client to connect and give info to the port that can listen openssl, this is a method to look for open ports using certain technology that could be vulnerable. Logging in On a kali vm/ linux machine Type: ssh bandit16@bandit.labs.overthewire.org -p 2220 cluFn7wTiGryunymYOu4RcffSxQluehd Completing The Challenge The Goal: The credentials for the next level can be retrieved by submitting the password of the current level to a port on localhost in the range 31000 to 32000 . First find out which of these ports have a server listening on them. Then find out which of those speak SSL and which don’t. There is only 1 server that will give the next credentials, the others will simply send back to you whatever you send to it. The Solution: bandit16@bandit:~$ nmap -p31000-32000 localhost Not shown: 996 closed ports PORT STATE SERVICE 31046/tcp open unknown 31518/tcp open...