Tags: misc miscellaneous 

Rating:

# STEM CTF Cyber Challenge 2019 – Nyan

* **Category:** Grab Bag
* **Points:** 50

## Challenge

> Nyayanayanayanayanayanayanayan
>
> ssh ctf@138.247.13.114

## Solution

Connecting in SSH will trigger a wonderful 8 bit *Nyan Cat* representation.

The flag is probably hidden in the data flow. To intercept it, the data exchanged with the server must be analyzed.

A [Python script](https://raw.githubusercontent.com/m3ssap0/CTF-Writeups/master/STEM%20CTF%20Cyber%20Challenge%202019/Nyan/nyan.py) can be written to help on this.

```python
import re
from pwn import *

l = listen()
shell = ssh(host="138.247.13.114", user="ctf", password="ctf")
sh = shell.run('sh')
while True:
received = sh.recvline()
if "MCA{" in received:
x = re.findall("MCA\{.+\}", received)
print x[0]
break
```

The flag is the following.

```
MCA{Airadaepohh8Sha}
```

Original writeup (https://github.com/m3ssap0/CTF-Writeups/blob/master/STEM%20CTF%20Cyber%20Challenge%202019/Nyan/README.md).