Rating:
For the full write-ups, please visit this [link](https://ctf-writeups.wonyk.com/Writeups/DawgCTF%202021/Binary%20Bomb/Phase%201)
-----
We are provided with an application – secret_app.exe in this challenge
Running it on Windows command prompt gives us this screen:
![](https://ctf-writeups.wonyk.com/assets/images/secret1-f92f6d751acf54475ab183d99217a35a.png)
As this is a executable file run on Binary machine code, I used OllyDbg to do a quick scan of the code.
Some digging of the code led to this:
![](https://ctf-writeups.wonyk.com/assets/images/secret2-2c57abf41ce3ccacff39f544625ed3d2.png)
Username: not_username
Password: not_password
Entering the following details into the secret_app.exe file gives us this:
![](https://ctf-writeups.wonyk.com/assets/images/secret3-a1c65996bd66eb835d373238bbe0e8ad.png)
Viola!
Flag: DawgCTF{4pp_sup3r_53cret}
Wow! OllyDbg still working :) Happy to know. Good times 10 years ago when I was playing with it.