Level goal
The password for the next level can be retrieved by submitting the password of the current level to port 30000 on localhost.
Login
ssh bandit14@bandit.labs.overthewire.org -p 2220
MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS
Doc
nc (1) - arbitrary TCP and UDP connections and listens
usage: nc [-46CDdFhklNnrStUuvZz] [-I length] [-i interval] [-M ttl]
[-m minttl] [-O length] [-P proxy_username] [-p source_port]
[-q seconds] [-s sourceaddr] [-T keyword] [-V rtable] [-W recvlimit]
[-w timeout] [-X proxy_protocol] [-x proxy_address[:port]]
[destination] [port]
Solution
The sollution for this level is pretty straight forward, just transmit the current password to localhost on port 30000 using netcat nc.
bandit14@bandit:~$ nc localhost 30000
MU4VWeTyJk8ROof1qqmcBPaLh7lDCPvS
Correct!
8xCjnmgoKbGLhHFAZlGE5Tmu4M2tKJQo