In this simple challenge, you need to break the protection in order to extract the flag
The link contained a binary file.
Let's start by running the binary:
We need to enter a password. Time to view the disassembly.
Since this is a golang binary, we'll use the golang_renamer.py script to restores function names from the stripped Go binary.
After the dust from running the script settles, we can take a look at the
main.main implementation. It's long and complicated, but a single function call stands out:
memequal call in a program that requests a password? That's worth a breakpoint.
We hit the breakpoint and the flag is all over the place.