Where no man has GOne before!

Description

In this simple challenge, you need to break the protection in order to extract the flag

http://revengme.challenges.bsidestlv.com/revengme

The link contained a binary file.

Solution

Let's start by running the binary:

We need to enter a password. Time to view the disassembly.

Since this is a golang binary, we'll use the golang_renamer.py script to restores function names from the stripped Go binary.

After the dust from running the script settles, we can take a look at the main.main implementation. It's long and complicated, but a single function call stands out:

A single memequal call in a program that requests a password? That's worth a breakpoint.

We hit the breakpoint and the flag is all over the place.