**Level Information**
> [!important] The password for the next level can be retrieved by submitting the password of the current level to **port 30001 on localhost** using SSL/TLS encryption.
>
> **Helpful note: Getting “DONE”, “RENEGOTIATING” or “KEYUPDATE”? Read the “CONNECTED COMMANDS” section in the manpage.**
>
>
>
> **Commands you may need to solve this level:**
>
> - ssh, telnet, nc, ncat, socat, openssl, s_client, nmap, netstat, ss
This one admittedly took me a while to figure out, looking through both the man pages and some trial and error.
**Here’s what I found:**
- `openssl`
- tool used for implementing and working with SSL and TLS. It can be used to generate keys, certificates and then test SSL or TLS connections.
- `s_client`
- option for openssl to initiate a SSL/TLS connection.
- `-connect localhost:30001`
- Specifies the address and port to connect to.
**Full command:**
```Bash
openssl s_client -connect localhost:30001
```
![[Level 15 - 16.png]]
This command initiates an SSL/TLS encrypted connection to the local machine on port `30001`.
After running the command, you’ll see some output indicating the SSL handshake, after which you can put in the password (for the current level) into the command prompt, and the server will process it.
![[Level 15 - 16-1.png]]