<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Escape Sequences on 4mN3s14 | CTF Player &amp; Student</title><link>https://john-jkar.github.io/myblog/tags/escape-sequences/</link><description>Recent content in Escape Sequences on 4mN3s14 | CTF Player &amp; Student</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 20 Feb 2026 06:00:00 +0000</lastBuildDate><atom:link href="https://john-jkar.github.io/myblog/tags/escape-sequences/index.xml" rel="self" type="application/rss+xml"/><item><title>Dancing Cursor - Daily Alpacahack Writeup</title><link>https://john-jkar.github.io/myblog/posts/missing-cursor/</link><pubDate>Fri, 20 Feb 2026 06:00:00 +0000</pubDate><guid>https://john-jkar.github.io/myblog/posts/missing-cursor/</guid><description>&lt;h1 id="dancing-cursor--daily--alpacahack-writeup"&gt;Dancing Cursor — Daily Alpacahack Writeup&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Challenge:&lt;/strong&gt; Dancing Cursor&lt;br&gt;
&lt;strong&gt;Category:&lt;/strong&gt; Rev / Misc&lt;br&gt;
&lt;strong&gt;Difficulty:&lt;/strong&gt; Medium&lt;/p&gt;
&lt;h2 id="the-challenge"&gt;The Challenge&lt;/h2&gt;
&lt;p&gt;We&amp;rsquo;re handed a single command:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;echo SGVyZSBpcyB0aGUgZmxhZzo... | base64 -d
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Running it in a terminal flashes the message:&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;Here is the flag:
Xiqxox{==============================================}
... but it has been wiped away.
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Clearly &lt;code&gt;Xiqxox{===}&lt;/code&gt; is a decoy. The real flag was written and then erased before we could see it.&lt;/p&gt;
&lt;h2 id="understanding-the-trick"&gt;Understanding the Trick&lt;/h2&gt;
&lt;p&gt;Decoding the base64 gives raw bytes that are mostly &lt;strong&gt;ANSI terminal escape sequences&lt;/strong&gt;. The structure is:&lt;/p&gt;</description></item></channel></rss>