The password for the next level can be retrieved by submitting the password of the current level to port 30000 on localhost.
In this level, the password isn’t hidden in a file or a git repo—it’s behind a network service. I already had the password for bandit14 (which I found in the previous level at /etc/bandit_pass/bandit14). Now, I needed to “talk” to the server on a specific port to get the next one.
I used Netcat (nc), which is often called the “Swiss Army Knife” of networking. It allows you to open TCP/UDP connections and send data directly.
Here is how I sent the password to the service:
$ cat /etc/bandit_pass/bandit14 | nc localhost 30000
By using the pipe |, I sent the content of the password file directly into the Netcat connection. The server received the password, verified it, and immediately replied with the password for Level 15.
[SPOILER]
nc to connect to a specific port on a server.