 This next challenge in Ryan Nicholson CTF is called FTP file transfer. It's for five points in the beginner section. It is a file transfer protocol challenge with a pcap or a packet capture that we can open up and view in Wireshark. So I'm going to copy this link location. I'll just double you get it into my command line here. And then if we wanted to, we could Wireshark that to open it up in a GUI form, ftp.pcap. If you don't have Wireshark installed, you can sudo apt install, etc. And FTP is plain text. So you can see in some of these packets here, the note in ASCII at the very bottom and the packet listing at the very top, we can see the commands that they run to actually authenticate and log in with this FTP session. You see them issue a command to retrieve flag.tex, open that file. And then in the FTP data stream, they actually do include the actual file itself. You can follow TCP stream and view the flag just like that. You can copy the file out of Wireshark. But since we know that FTP is plain text, we could just simply run strings on this file. And then if we wanted to grep for flag, we can get the very last line and then cut it up at the hyphen as delimiter and get that last field. And there is our flag. We can take note of this as a get flag script and we can be done with this challenge. Mark that as executable. And just like that, we have completed that challenge. Simple file transfer protocol in Wireshark. Hey, I need to give a shout out to my supporters. These individuals are fantastic. I'm very grateful and appreciative that you're willing to help me out on Patreon. $1 a month on Patreon will give you a shout out just like this at the end of every video. $5 a month will give you early access to everything I create on YouTube. If you did like this video, please do like, comment, and subscribe. And I'll see you in another video. Join us on Discord.