需要注意的是,Ctrl + d 组合键同时也有其他功能。当输入行为空时,它表示输入结束,即退出当前Shell会话。因此,如果当前输入行不为空,你需要确保光标处于要删除的字符的左侧,以避免意外退出会话。
tip4
在Shell上,你可以使用以下快捷键以单词为单位移动光标:
Ctrl + ←:向左移动光标到前一个单词的开头。
Ctrl + →:向右移动光标到后一个单词的结尾。
Bandit Level 11 → Level 12
The password for the next level is stored in the file data.txt, where all lowercase (a-z) and uppercase (A-Z) letters have been rotated by 13 positions 下一级的密码存储在文件 data.txt 中,其中所有小写 (a-z) 和大写 (A-Z) 字母都旋转了 13 个位置
1 2 3 4
bandit11@bandit:~$ tr 'A-Za-z' 'N-ZA-Mn-za-m' < data.txt The password is JVNBBFSmZwKKOP0XbFXOoW8chDz5yVRv bandit11@bandit:~$ cat data.txt Gur cnffjbeq vf WIAOOSFzMjXXBC0KoSKBbJ8puQm5lIEi
bandit16@bandit:~$ nmap -sV localhost -p 31000-32000 Starting Nmap 7.80 ( https://nmap.org ) at 2024-01-13 11:11 UTC Stats: 0:01:33 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan Service scan Timing: About 80.00% done; ETC: 11:13 (0:00:23 remaining) Nmap scan report for localhost (127.0.0.1) Host is up (0.00014s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 31046/tcp open echo 31518/tcp open ssl/echo 31691/tcp open echo 31790/tcp open ssl/unknown 31960/tcp open echo 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port31790-TCP:V=7.80%T=SSL%I=7%D=1/13%Time=65A26FDD%P=x86_64-pc-linux-g SF:nu%r(GenericLines,31,"Wrong!\x20Please\x20enter\x20the\x20correct\x20cu SF:rrent\x20password\n")%r(GetRequest,31,"Wrong!\x20Please\x20enter\x20the SF:\x20correct\x20current\x20password\n")%r(HTTPOptions,31,"Wrong!\x20Plea SF:se\x20enter\x20the\x20correct\x20current\x20password\n")%r(RTSPRequest, SF:31,"Wrong!\x20Please\x20enter\x20the\x20correct\x20current\x20password\ SF:n")%r(Help,31,"Wrong!\x20Please\x20enter\x20the\x20correct\x20current\x SF:20password\n")%r(SSLSessionReq,31,"Wrong!\x20Please\x20enter\x20the\x20 SF:correct\x20current\x20password\n")%r(TerminalServerCookie,31,"Wrong!\x2 SF:0Please\x20enter\x20the\x20correct\x20current\x20password\n")%r(TLSSess SF:ionReq,31,"Wrong!\x20Please\x20enter\x20the\x20correct\x20current\x20pa SF:ssword\n")%r(Kerberos,31,"Wrong!\x20Please\x20enter\x20the\x20correct\x SF:20current\x20password\n")%r(FourOhFourRequest,31,"Wrong!\x20Please\x20e SF:nter\x20the\x20correct\x20current\x20password\n")%r(LPDString,31,"Wrong SF:!\x20Please\x20enter\x20the\x20correct\x20current\x20password\n")%r(LDA SF:PSearchReq,31,"Wrong!\x20Please\x20enter\x20the\x20correct\x20current\x SF:20password\n")%r(SIPOptions,31,"Wrong!\x20Please\x20enter\x20the\x20cor SF:rect\x20current\x20password\n");
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 98.38 seconds
for port in {31000..32000}; do echo -ne "\rScanning port $port "; timeout 1 bash -c "</dev/tcp/localhost/$port" &>/dev/null && echo "PORT $port is open"; done