 Well, hello. So if you, you know, watch any other computer programming guys on YouTube, you've probably seen a couple of videos for this year's Capture the Flag by Google. And I didn't even know this was going on until I saw some videos. And I love this sort of thing. I was like, oh, I don't have time to do that. But then I started watching some of these videos. And it really got me interested in it. And, you know, the first few of these are very simple, but it's interesting watching people go through some of these processes. And so I thought I'd go through them because a lot of the videos, they show how the things are done, but they don't necessarily go through the mindset of some of the things. And I actually learned stuff. So you can see I've done a few of these so far. But this one right here, the Admin UI, I just finished it. And to be quite honest, it's like I watched a video. First of all, let me say, okay, so for a couple months now, I've been, I've been subscribed to this guy live overflow, enjoy his videos a lot. And then he did a video referencing this guy, John Hammond, who I've only had a chance to watch a couple of his videos. Turns out he's a viewer of mine, and which is awesome. And he's doing these videos. And I liked his idea of not just solving them, but when he's done, he puts everything in a script so you can run the script, and it just automates everything. So I love that idea. So I thought I'd do the same thing. And, and especially with the, like I said, this one with the Admin UI, he showed how it was done. And he admitted that, you know, he got help from other people. So before I went into it, I already had the answer on how he accomplished it. But I backward, I peddled back to figure out how I would have done that if I didn't already know the answer, obviously. So when I get to that one in a couple of videos, I will definitely hopefully teach you guys a bunch of new things because I learned a bunch of new things. Anyway, this one, this video has kind of a long intro because the solution is super simple. So this is kind of an introduction and first video. Also, if you want, go to GitLab, GitLab. I just moved from GitHub. I ported all my projects over to GitLab, you know, since Microsoft bought GitHub, I figured sooner the better, get away from there, doesn't, I mean, I might still continuously back stuff up there. Doesn't hurt to have two copies of stuff. Actually, I have local copies as well, which also, you know, I had been meaning to do. And after seeing John Hammond here, he did a video on how to port all your files over, which actually GitHub does automatically for you, basically you log in, create account on GitLab. And anyway, I'm getting off topic here, but you can port, I'll show you. Anyway, go to gitlab.com forward slash metal x 1000 search my repositories for CTF capture the flag or just go to metal x 1000 forward slash CTF. And I actually am uploading the automated scripts. So all these I haven't done this JS safe one yet. But all these have scripts that you run. And it grabs the flag for you. And then you can look through the script and see how I did it. But I'm going to walk you through all those in these videos. So let's get started with the first one here, which is the letter one. And you want to read what they have here. Sometimes it seems a little stupid, but sometimes there's little clues in there on how to do stuff. But here it tells you the story of how you got this information. So you really went dumpster diving amazing after many hours success between what looks like a three week old casserole and a copy of a relative times magazine, you found this important looking letter about the victim's PC. However, the cuff credentials aren't readable. Can you still obtain them? And well, you can see I already put in the flag here. But you download the attachment, which is a zip file. And let's go ahead. And what I'm going to do is switch over to my shell here. I'm going to go into letter here. So if you look in here, I've got some files here. And actually, if I run my script here, it's going to download the zip file, extract the PDF, run my code on it, and it gives you the flag. But let's look through how all this works. So again, you download the zip file and unzips it, and you have a PDF file. So do I have X PDF? I just reformatted my system. So pseudo apt install. I know there's probably better PDF viewers, but this is the one that I know by name. You know, you got to type your password right to install stuff. So anyway, I'm going to open this up in a PDF viewer. X PDF. There we go. You can see the names redacted. Now, some PDF viewers, if you highlight over that, you will see the password and there's nothing more you need to do or the flag, whatever you will call it. But let's see if I now go into VIM, just an empty file here. Whoops. I'm just curious as to if, like I said, you can see the text in a control C to copy that VIM. Nope, it's not copying anything. Anyway, like I said, some PDF viewers, you will see the password as soon as you do that. I'm going to try that one more time. Highlight. Is there a copy option? Nope. Anyway, the words are right there. Believe me or not. But what we're going to use is PDF to text, which I use these PDF tools a lot of time to convert to different types of HTML and other formats because a lot of times you need to pull information out of PDFs and it's easier if they aren't PDFs for doing that. So if I do this, I can then pipe it to a file or if I just give it the dash, it will give it the standard output and we'll get the text on the screen. And there is your little flag. So let's have a look at letter SH. So I start off by removing the any PDFs and then I'm going to download and output the file to letter dot zip. I'm going to unzip it. And then I'm going to do just what I did. I use PDF to text on that PDF sent the standard out. I pipe it in the grep searching for CTF. And then I use print op three for column three, because if we exit out of here, you can see that we've got column one, column two, and column three. So again, running that script automates everything for you and it gives you just the flag so you can copy this and paste it into the Google website and move on. Excuse me. That's it for this video. I hope you found this interesting. Again, this one is super simple. I wish I had another PDF viewer installed to show you that you could just highlight and see the password in some viewers. XPDF didn't seem to do that. So super simple. You didn't need to do anything, but if you want to be cool about it, use your tools, PDF to text, and then just get the output and you see it right away. Again, if you need to go over that again, look at my shell script here. Very straightforward. As always, please visit filmsbychris.com. That's Chris the K. There's a link in the description and I hope that you have a great day.