Tags: misc miscellaneous
Rating:
# STEM CTF Cyber Challenge 2019 – Nyan
* **Category:** Grab Bag
* **Points:** 50
## Challenge
> Nyayanayanayanayanayanayanayan
>
> ssh [email protected]
## Solution
Connecting in SSH will trigger a wonderful 8 bit *Nyan Cat* representation.
The flag is probably hidden in the data flow. To intercept it, the data exchanged with the server must be analyzed.
A [Python script](https://raw.githubusercontent.com/m3ssap0/CTF-Writeups/master/STEM%20CTF%20Cyber%20Challenge%202019/Nyan/nyan.py) can be written to help on this.
```python
import re
from pwn import *
l = listen()
shell = ssh(host="138.247.13.114", user="ctf", password="ctf")
sh = shell.run('sh')
while True:
received = sh.recvline()
if "MCA{" in received:
x = re.findall("MCA\{.+\}", received)
print x[0]
break
```
The flag is the following.
```
MCA{Airadaepohh8Sha}
```