Training / picoCTF / Forensics / Scan Surprise
# Scan Surprise
Challenge description:
> I've gotten bored of handing out flags as text. Wouldn't it be cool if they were an image instead?
>
> The same files are accessible via SSH here: ssh -p 61966 ctf-player@atlas.picoctf.net Using the password 1db87a14. Accept the fingerprint with yes, and ls once connected to begin. Remember, in a shell, passwords are hidden!
So, lets ssh into this! using the provided command `ssh -p 61966 ctf-player@atlas.picoctf.net` and the password `1db87a14`, we see this when we get in.

And scanning the qr code reveals the flag!
FLAG: `picoCTF{p33k_@_b00_19eccd10}`