Tags: grabbag 

Rating:

# Nyan (Grab Bag 50)

Yay, Grab Bag! This section contains a lot of steganography, hiding data, all that jazz. Since this is my specialty, you can imagine how excited I was to do these challenges.

We're given an IP address to SSH into. Let's SSH into it.

```
$ ssh [email protected]
```

![](https://github.com/shawnduong/ctf-writeups/blob/master/2019-MITRE-STEM/images/Nyan.png)

Looks like that's all there is to this. Intuition tells me that there must be some sort of data hidden in this. Let's SSH into it, but this time, we're going to redirect the terminal output to a file that we can then read. We only need one or two frames of the animation. It'll take a few seconds to connect, and then we won't know the animation is playing due to its output being redirected. We can assume that it'll take a few seconds, and therefore just wait a few seconds before exiting.

```
$ ssh [email protected] > sshout
Connection to 138.247.13.114 closed.
```

Now, if we `cat` the output, it'll show a frame of the animation and then quickly clear your terminal. Instead, let's `strings` it to clear out most of the junk, and then grep it for the flag.

```
$ strings sshout | grep "MCA{.*}"
Flag is: MCA{Airadaepohh8Sha}
Flag is: MCA{Airadaepohh8Sha}
Flag is: MCA{Airadaepohh8Sha}
Flag is: MCA{Airadaepohh8Sha}
Flag is: MCA{Airadaepohh8Sha}
Flag is: MCA{Airadaepohh8Sha}
Flag is: MCA{Airadaepohh8Sha}
Flag is: MCA{Airadaepohh8Sha}
...
```

Original writeup (https://github.com/shawnduong/ctf-writeups/blob/master/2019-MITRE-STEM/Nyan.md).