 So everybody my name is John Hammond looking more at the LASA CTF challenges Just moving on to grep quest was another challenge I just started to work on and just completed so I figured I could show you how I cranked that out I want us to locate the flag and all the words at this directory And I'm assuming this directory refers to their server and on their shell So you can go up to the shell over here as part of their web shell If you're feeling fancy though, they say you can open a terminal and type it Even SSH in them so you don't have to use this web terminal Which I'm glad because I didn't really want to use their their web shell. I thought that was pretty gross So I actually just pulled up in a terminal I would SSH into that with my username which in my case is objidump It has created a path like a user for me by the time I was able to log in First time I was at log in that as for my password after I reconnect and I reconnected and I was able to log in See if I can now Guess I have to enter my password one more time. Okay, cool. So now I'm logged in And the photos are all in this path. So let's just head out over there. I'll make this visible for you. Sorry So I can see to that directory Looks at all this stuff. So there's a lot of files in here So I didn't really want to look through all of them if I actually use grep-r It's kind of like a global cat if you use a capital R So let's you like grep for everything in every single file So what I'll do is I'll just go ahead and look for LASA or something with that LASA flag And I immediately find in the potato.txt file, which is apparently one in there and it says LASA CTF and Here's our flag so we can go ahead and paste that in and get our 40 points super easy Not that bad literally just one line and a grep-r look for the flag configuration good stuff Thanks for watching guys simple and I'll see you in the next video tutorial