 This next challenge in Ryan Nicholson CTF is called findtheflag.txt capital F in this flag file. So keep that in mind that is important when we're trying to track this thing down because all we have to do is find this file and actually view the contents, cut it out, and that's what we submit as our flag. So it gives us a shell we can connect to, gives us some commands and like at least credentials to log in with. So once we try and get in, we can run things except it doesn't look like we actually have any tools to work with. LS and all those things that we might want are straight up gone. So I was wondering like, well, okay, what is this? Do we still have the files? And I tried them in their absolute director and that seemed absolute path and that seemed to work okay. So I was curious what was really wrong here. There's nothing in this directory. That's the only reason why LS didn't work. If we wanted to tack out, we could see it or attack a whatever. But so we know that that command is there. But for some reason, we couldn't actually execute it. So I wanted to check out what is the path environment variable set to and I noticed that it doesn't have forward slash bin or any of the other paths that were used to particularly in there. So if we wanted to like find where the find command is what we wanted to use, we wouldn't be able to where is which is that in bin? Yeah, so we could check out find which apparently doesn't have whatever. But I so so I know that's in user bin find it and that's how we can set that if we wanted to check out the variable, we can actually set the variable to what we want here with user bin included. And then we can actually end out the path just like that. So now we can run find and LS and cat and everything just find because we've reset the path to what it should be. So let's go ahead and actually run that find command, start at the root directory, and set the name that we're trying to look for for that capital F flag dot text. And there are some folders that we can't check out because we don't have the permission, but we do see it in this directory. So let's cat out that lib x86 x64 linux canoe security flag dot text. And did I spell something wrong? I needed to have an underscore there my bet. Okay, cool. There is the flag that we can submit and spit out or use or whatever we need to. But let's take note of it in our own. So we can mark that challenge as complete. So that was an interesting thing just keeping in mind that your path environment variable does actually matter when you're trying to track down your commands, keep that in mind, or just be sure to like check out what is the absolute path going to work. Well, let actually retrieve a command output for me. So good things to test around. Hey, I want to give a special shout out and some love to my Patreon supporters. You guys are fantastic. I'm so happy that this list keeps growing. One dollar more on Patreon will give you a special shout out at the end of every video just like this $5 a month on Patreon will give you early access to everything that I release on YouTube. Hey, if you did like this video, please do press that like button maybe leave me a comment if you're willing to subscribe and check us out on discord link in the description and join the server and hopefully see you on Patreon. That'd be awesome. Thanks.