This is an Athena run-around of sorts. Many of the Athena commands are named after characters from 'A Streetcar Named Desire', hence the puzzle's title.
-c SPIES-STATUS-NOTIFICATIONS
The first step is to subscribe to the zephyr class 'spies-status-notifications'. Every 60 seconds, a zephyr is set there containing the words 'eit-headquarters'.
TAG
'eit-headquarters' is a mailing list. Using 'moira', one can tell that it has multiple users on it:athena% blanche eit-headquarters STRING:red herrings are tasty fish...however, the *real* clue lies in the 'tags' of the users on the list, as can be found using 'blanche -t':athena% blanche eit-headquarters -t STRING:red herrings are tasty fish (eit-komputer)
VENDOR
'eit-komputer' is (as its name implies) a computer. Using
'stella', we find:
athena% stella eit-komputer
Machine: EIT-KOMPUTER.MIT.EDU
[...]
Vendor: LARRYBEN Location: 64-G509
[...]
UID
Next, we must find 'larryben's user id, using hesinfo:
athena% hesinfo larryben passwd
larryben:*:22148:101:Lawrence G Benedict,,4-110,6172534052,:/mit/larryben:/bin/athena/tcsh
OWNER
'22148' is actually a list! Using blanche, we find:
athena% blanche 22148 -i
List: 22148
[...]
Owner: USER alexmv
PLAN
Using finger, we find 'alexmv's .plan:
athena% finger alexmv
Login name: alexmv
[...]
Plan:
To take over the world! Bwahaha!
I maintain the chmrr.net domain in my copious spare time.
TXT RECORD
Using 'dig', we can find the 'TXT' record of the chmrr.net domain:
athena% dig -t TXT chmrr.net
[...]
;; ANSWER SECTION:
chmrr.net. 259200 IN TXT "eit-backdoor"
LOCATION
'eit-backdoor' is a computer. Using 'stella', we find:
athena% stella eit-backdoor
Machine: EIT-BACKDOOR.MIT.EDU
[...]
Location: 56777
MEMBER
56777 is the group id (GID) of a group. Using hesinfo, we can find the group:athena% hesinfo 56777 gid ambiguous:*:56777:...and from there, its members, using 'blanche':STRING:1. validate locker slash file STRING:2. http web slash file STRING:3. perl-lib locker slash file STRING:4. accounts locker slash file STRING:5. resnet locker slash port
SIZE
Those point to five files; their content is irrelevant, all we
care about is their sizes:
/mit/validate/file 18
http://web.mit.edu/file 101
/mit/perl-lib/file 3
/mit/accounts/file 92
/mit/resnet/port 31337
CONNECT
Connecting to the IP address 18.101.3.92:31337, we recieve a 1.3M
file:
athena% nc 18.101.3.92 31337 > saved
[...]
WIRETAP
Using 'file', we determine:athena% file saved saved: tcpdump capture file (little-endian) - version 2.4 (Ethernet, capture length 65535)It is easiest to analyze this file in Ethereal or tcpflow (from the sipbnet and outland lockers, respectively). Running tcpflow on the file:athena% add outland athena% tcpflow -r saved...produces one file, signifying that all of the information was one-way between two hosts.
WORD 64636
Using 'file' on the output from tcpflow, we determine:athena% file file 010.000.000.018.60430-018.101.003.088.31337 010.000.000.018.60430-018.101.003.088.31337: gzip compressed data, from UnixWe unzip this using gunzip:athena% cat 010.000.000.018.60430-018.101.003.088.31337 | gunzip > unzipped...and we find a lone list of words. Taking the 64636th word, we obtain "warmths."
Thus, the answer is WARMTHS.
2006 MIT Mystery Hunt