Rating:

For the full write-ups, please visit this [link](https://ctf-writeups.wonyk.com/Writeups/DawgCTF%202021/Binary%20Bomb/Phase%201)

-----

We are provided with an application – secret_app.exe in this challenge

Running it on Windows command prompt gives us this screen:

![](https://ctf-writeups.wonyk.com/assets/images/secret1-f92f6d751acf54475ab183d99217a35a.png)

As this is a executable file run on Binary machine code, I used OllyDbg to do a quick scan of the code.

Some digging of the code led to this:

![](https://ctf-writeups.wonyk.com/assets/images/secret2-2c57abf41ce3ccacff39f544625ed3d2.png)

Username: not_username
Password: not_password

Entering the following details into the secret_app.exe file gives us this:

![](https://ctf-writeups.wonyk.com/assets/images/secret3-a1c65996bd66eb835d373238bbe0e8ad.png)

Viola!

Flag: DawgCTF{4pp_sup3r_53cret}

Original writeup (https://ctf-writeups.wonyk.com/Writeups/DawgCTF%202021/Reversing).
NeptunianMay 16, 2021, 11:49 p.m.

Wow! OllyDbg still working :) Happy to know. Good times 10 years ago when I was playing with it.