This is an Athena run-around of sorts. Many of the Athena commands are named after characters from 'A Streetcar Named Desire', hence the puzzle's title.
-c SPIES-STATUS-NOTIFICATIONS
The first step is to subscribe to the zephyr class 'spies-status-notifications'. Every 60 seconds, a zephyr is set there containing the words 'eit-headquarters'.
TAG
'eit-headquarters' is a mailing list. Using 'moira', one can tell that it has multiple users on it:athena% blanche eit-headquarters STRING:red herrings are tasty fish...however, the *real* clue lies in the 'tags' of the users on the list, as can be found using 'blanche -t':athena% blanche eit-headquarters -t STRING:red herrings are tasty fish (eit-komputer)
VENDOR
'eit-komputer' is (as its name implies) a computer. Using 'stella', we find:athena% stella eit-komputer Machine: EIT-KOMPUTER.MIT.EDU [...] Vendor: LARRYBEN Location: 64-G509 [...]
UID
Next, we must find 'larryben's user id, using hesinfo:athena% hesinfo larryben passwd larryben:*:22148:101:Lawrence G Benedict,,4-110,6172534052,:/mit/larryben:/bin/athena/tcsh
OWNER
'22148' is actually a list! Using blanche, we find:athena% blanche 22148 -i List: 22148 [...] Owner: USER alexmv
PLAN
Using finger, we find 'alexmv's .plan:athena% finger alexmv Login name: alexmv [...] Plan: To take over the world! Bwahaha! I maintain the chmrr.net domain in my copious spare time.
TXT RECORD
Using 'dig', we can find the 'TXT' record of the chmrr.net domain:athena% dig -t TXT chmrr.net [...] ;; ANSWER SECTION: chmrr.net. 259200 IN TXT "eit-backdoor"
LOCATION
'eit-backdoor' is a computer. Using 'stella', we find:athena% stella eit-backdoor Machine: EIT-BACKDOOR.MIT.EDU [...] Location: 56777
MEMBER
56777 is the group id (GID) of a group. Using hesinfo, we can find the group:athena% hesinfo 56777 gid ambiguous:*:56777:...and from there, its members, using 'blanche':STRING:1. validate locker slash file STRING:2. http web slash file STRING:3. perl-lib locker slash file STRING:4. accounts locker slash file STRING:5. resnet locker slash port
SIZE
Those point to five files; their content is irrelevant, all we care about is their sizes:/mit/validate/file 18 http://web.mit.edu/file 101 /mit/perl-lib/file 3 /mit/accounts/file 92 /mit/resnet/port 31337
CONNECT
Connecting to the IP address 18.101.3.92:31337, we recieve a 1.3M file:athena% nc 18.101.3.92 31337 > saved [...]
WIRETAP
Using 'file', we determine:athena% file saved saved: tcpdump capture file (little-endian) - version 2.4 (Ethernet, capture length 65535)It is easiest to analyze this file in Ethereal or tcpflow (from the sipbnet and outland lockers, respectively). Running tcpflow on the file:athena% add outland athena% tcpflow -r saved...produces one file, signifying that all of the information was one-way between two hosts.
WORD 64636
Using 'file' on the output from tcpflow, we determine:athena% file file 010.000.000.018.60430-018.101.003.088.31337 010.000.000.018.60430-018.101.003.088.31337: gzip compressed data, from UnixWe unzip this using gunzip:athena% cat 010.000.000.018.60430-018.101.003.088.31337 | gunzip > unzipped...and we find a lone list of words. Taking the 64636th word, we obtain "warmths."
Thus, the answer is WARMTHS.
2006 MIT Mystery Hunt