Training / picoCTF / Forensics / Scan Surprise

# Scan Surprise Challenge description: > I've gotten bored of handing out flags as text. Wouldn't it be cool if they were an image instead? > > The same files are accessible via SSH here: ssh -p 61966 ctf-player@atlas.picoctf.net Using the password 1db87a14. Accept the fingerprint with yes, and ls once connected to begin. Remember, in a shell, passwords are hidden! So, lets ssh into this! using the provided command `ssh -p 61966 ctf-player@atlas.picoctf.net` and the password `1db87a14`, we see this when we get in. ![qr code](assets/image1.png) And scanning the qr code reveals the flag! FLAG: `picoCTF{p33k_@_b00_19eccd10}`