𝖈𝖞𝖇𝖊𝖗𝖌𝖚𝖗𝖚💀~$

Hamza's Blog

View on GitHub

G0l4ng_1s_C00l

This challenge is based on Golang compiled binaries, so today we are going to reverse a Golang (Mr. memory safe ;) ) executable file, as usual a zip file was given, unzipping the file we have an executable called hey.exe

using wine to run the executable file we were asked to enter a username and a password

once a wrong password is entered the program simply exits

let’s try running the Linux command strings on the file and see if we could get the password:

we were greeted with large chunks of text and blobs of data nothing interesting to use

let’s try decompiling the executable in ghidra::

after ghidra successfully decompiled it we saw lots and lots of functions the program used, why is this ?

We did a little googling, and I was able to find out that the reason that a compiled program in Go may appear to have multiple functions due is to compiler optimizations, runtime support, standard library functions, and compiler-generated code are all packed into the executable it’self (hmm… reason why the file size was about 2.7mb in size)

we did a little search on the main function and some little analysis on the decompiled code in Ghidra, but we didn’t get anything promising, i went on to try and search for strings that we saw when we execute the program but to no avail; this is due to the fact that Golang does not use a null byte to terminate strings unlike C/C++; so everything is clamped up together and Ghidra wasn’t able to find our target search string.

i went back to IDA, after loading and performing analysis on the executable file we got something interesting, IDA was able to decode the function call’s properly and name the entry point, doing some googling again we saw that in most cases of golang decompiled binaries, the entry point is always a function called main_main these were our main program is stored.


text:0000000000E9BC80 ; =============== S U B R O U T I N E =======================================
.text:0000000000E9BC80
.text:0000000000E9BC80 ; Attributes: noreturn
.text:0000000000E9BC80
.text:0000000000E9BC80 ; void __cdecl main_main()
.text:0000000000E9BC80                 public main_main
.text:0000000000E9BC80 main_main       proc near               ; CODE XREF: runtime_main+1FC↑p
.text:0000000000E9BC80                                         ; .text:0000000000E9BF80↓j
.text:0000000000E9BC80                                         ; DATA XREF: ...
.text:0000000000E9BC80
.text:0000000000E9BC80 var_A0          = qword ptr -0A0h
.text:0000000000E9BC80 var_98          = qword ptr -98h
.text:0000000000E9BC80 var_90          = qword ptr -90h
.text:0000000000E9BC80 var_88          = xmmword ptr -88h
.text:0000000000E9BC80 var_78          = xmmword ptr -78h
.text:0000000000E9BC80 var_68          = xmmword ptr -68h
.text:0000000000E9BC80 var_58          = xmmword ptr -58h
.text:0000000000E9BC80 var_48          = xmmword ptr -48h
.text:0000000000E9BC80 var_38          = xmmword ptr -38h
.text:0000000000E9BC80 var_28          = xmmword ptr -28h
.text:0000000000E9BC80 var_18          = xmmword ptr -18h
.text:0000000000E9BC80 var_8           = qword ptr -8
.text:0000000000E9BC80
.text:0000000000E9BC80                 lea     r12, [rsp+var_48]
.text:0000000000E9BC85                 cmp     r12, [r14+10h]
.text:0000000000E9BC89                 jbe     loc_E9BF78
.text:0000000000E9BC8F                 sub     rsp, 0C8h
.text:0000000000E9BC96                 mov     [rsp+0C8h+var_8], rbp
.text:0000000000E9BC9E                 lea     rbp, [rsp+0C8h+var_8]
.text:0000000000E9BCA6                 lea     rax, unk_EA4300
.text:0000000000E9BCAD                 call    runtime_newobject
.text:0000000000E9BCB2                 mov     [rsp+0C8h+var_A0], rax
.text:0000000000E9BCB7                 mov     qword ptr [rax], 0
.text:0000000000E9BCBE                 movups  [rsp+0C8h+var_18], xmm15
.text:0000000000E9BCC7                 lea     rcx, unk_EA4300
.text:0000000000E9BCCE                 mov     qword ptr [rsp+0C8h+var_18], rcx
.text:0000000000E9BCD6                 lea     rdx, off_EDBCF8 ; "Enter your username : "
.text:0000000000E9BCDD                 mov     qword ptr [rsp+0C8h+var_18+8], rdx
.text:0000000000E9BCE5                 mov     rbx, cs:os_Stdout
.text:0000000000E9BCEC                 mov     edi, 1

<-!snip>

i went on to search for strings we saw during runtime of the program and sure enough IDA was also able to restore strings and properly separate them, how is this done ?

Doing some more googling we found out that Golang’s strings are stored at runtime in a particular structure called StringHeader with two fields:

type StringHeader struct {
        Data uintptr       // string value
        Len  int           // string size 
}

The string’s characters (pointed by the Data field) are stored in data sections of the executables, as a series of UTF-8 encoded characters without null-terminators.

Well that’s it for the decompilation stage as everything is in place let’s now go ahead to reverse engineer the program ;)

text:0000000000E9BC80 ; =============== S U B R O U T I N E =======================================
.text:0000000000E9BC80
.text:0000000000E9BC80 ; Attributes: noreturn
.text:0000000000E9BC80
.text:0000000000E9BC80 ; void __cdecl main_main()
.text:0000000000E9BC80                 public main_main
.text:0000000000E9BC80 main_main       proc near               ; CODE XREF: runtime_main+1FC↑p
.text:0000000000E9BC80                                         ; .text:0000000000E9BF80↓j
.text:0000000000E9BC80                                         ; DATA XREF: ...
.text:0000000000E9BC80
.text:0000000000E9BC80 var_A0          = qword ptr -0A0h
.text:0000000000E9BC80 var_98          = qword ptr -98h
.text:0000000000E9BC80 var_90          = qword ptr -90h
.text:0000000000E9BC80 var_88          = xmmword ptr -88h
.text:0000000000E9BC80 var_78          = xmmword ptr -78h
.text:0000000000E9BC80 var_68          = xmmword ptr -68h
.text:0000000000E9BC80 var_58          = xmmword ptr -58h
.text:0000000000E9BC80 var_48          = xmmword ptr -48h
.text:0000000000E9BC80 var_38          = xmmword ptr -38h
.text:0000000000E9BC80 var_28          = xmmword ptr -28h
.text:0000000000E9BC80 var_18          = xmmword ptr -18h
.text:0000000000E9BC80 var_8           = qword ptr -8
.text:0000000000E9BC80
.text:0000000000E9BC80                 lea     r12, [rsp+var_48]
.text:0000000000E9BC85                 cmp     r12, [r14+10h]
.text:0000000000E9BC89                 jbe     loc_E9BF78
.text:0000000000E9BC8F                 sub     rsp, 0C8h
.text:0000000000E9BC96                 mov     [rsp+0C8h+var_8], rbp
.text:0000000000E9BC9E                 lea     rbp, [rsp+0C8h+var_8]
.text:0000000000E9BCA6                 lea     rax, unk_EA4300
.text:0000000000E9BCAD                 call    runtime_newobject
.text:0000000000E9BCB2                 mov     [rsp+0C8h+var_A0], rax
.text:0000000000E9BCB7                 mov     qword ptr [rax], 0
.text:0000000000E9BCBE                 movups  [rsp+0C8h+var_18], xmm15
.text:0000000000E9BCC7                 lea     rcx, unk_EA4300
.text:0000000000E9BCCE                 mov     qword ptr [rsp+0C8h+var_18], rcx
.text:0000000000E9BCD6                 lea     rdx, off_EDBCF8 ; "Enter your username : "
.text:0000000000E9BCDD                 mov     qword ptr [rsp+0C8h+var_18+8], rdx
.text:0000000000E9BCE5                 mov     rbx, cs:os_Stdout
.text:0000000000E9BCEC                 mov     edi, 1
.text:0000000000E9BCF1                 mov     rsi, rdi
.text:0000000000E9BCF4                 lea     rax, go_itab__os_File_io_Writer
.text:0000000000E9BCFB                 lea     rcx, [rsp+0C8h+var_18]
.text:0000000000E9BD03                 call    fmt_Fprintln
.text:0000000000E9BD08                 movups  [rsp+0C8h+var_28], xmm15
.text:0000000000E9BD11                 lea     rcx, unk_EA2500
.text:0000000000E9BD18                 mov     qword ptr [rsp+0C8h+var_28], rcx
.text:0000000000E9BD20                 mov     rdx, [rsp+0C8h+var_A0]
.text:0000000000E9BD25                 mov     qword ptr [rsp+0C8h+var_28+8], rdx
.text:0000000000E9BD2D                 mov     rbx, cs:os_Stdin
.text:0000000000E9BD34                 lea     rax, go_itab__os_File_io_Reader
.text:0000000000E9BD3B                 mov     edi, 1
.text:0000000000E9BD40                 mov     rsi, rdi
.text:0000000000E9BD43                 lea     rcx, [rsp+0C8h+var_28]
.text:0000000000E9BD4B                 call    fmt_Fscanln
.text:0000000000E9BD50                 movups  [rsp+0C8h+var_38], xmm15
.text:0000000000E9BD59                 lea     rcx, unk_EA4300
.text:0000000000E9BD60                 mov     qword ptr [rsp+0C8h+var_38], rcx
.text:0000000000E9BD68                 lea     rdx, off_EDBD08 ; "Enter your password : "
.text:0000000000E9BD6F                 mov     qword ptr [rsp+0C8h+var_38+8], rdx
.text:0000000000E9BD77                 mov     rbx, cs:os_Stdout
.text:0000000000E9BD7E                 lea     rax, go_itab__os_File_io_Writer
.text:0000000000E9BD85                 mov     edi, 1
.text:0000000000E9BD8A                 mov     rsi, rdi
.text:0000000000E9BD8D                 lea     rcx, [rsp+0C8h+var_38]
.text:0000000000E9BD95                 call    fmt_Fprintln
.text:0000000000E9BD9A                 lea     rax, unk_EA4300
.text:0000000000E9BDA1                 call    runtime_newobject
.text:0000000000E9BDA6                 mov     [rsp+0C8h+var_98], rax
.text:0000000000E9BDAB                 mov     qword ptr [rax], 0
.text:0000000000E9BDB2                 movups  [rsp+0C8h+var_48], xmm15
.text:0000000000E9BDBB                 lea     rcx, unk_EA2500
.text:0000000000E9BDC2                 mov     qword ptr [rsp+0C8h+var_48], rcx
.text:0000000000E9BDCA                 mov     qword ptr [rsp+0C8h+var_48+8], rax
.text:0000000000E9BDD2                 mov     rbx, cs:os_Stdin
.text:0000000000E9BDD9                 mov     edi, 1
.text:0000000000E9BDDE                 mov     rsi, rdi
.text:0000000000E9BDE1                 lea     rax, go_itab__os_File_io_Reader
.text:0000000000E9BDE8                 lea     rcx, [rsp+0C8h+var_48]
.text:0000000000E9BDF0                 call    fmt_Fscanln
.text:0000000000E9BDF5                 mov     rcx, [rsp+0C8h+var_A0]
.text:0000000000E9BDFA                 mov     rdx, [rcx]
.text:0000000000E9BDFD                 cmp     qword ptr [rcx+8], 5
.text:0000000000E9BE02                 jnz     short loc_E9BE7B
.text:0000000000E9BE04                 cmp     dword ptr [rdx], 'imda'
.text:0000000000E9BE0A                 jnz     short loc_E9BE7B
.text:0000000000E9BE0C                 cmp     byte ptr [rdx+4], 'n'
.text:0000000000E9BE10                 jnz     short loc_E9BE7B
.text:0000000000E9BE12                 mov     rdx, [rsp+0C8h+var_98]
.text:0000000000E9BE17                 mov     r8, [rdx]
.text:0000000000E9BE1A                 cmp     qword ptr [rdx+8], 7
.text:0000000000E9BE1F                 nop
.text:0000000000E9BE20                 jnz     short loc_E9BE7B
.text:0000000000E9BE22                 cmp     dword ptr [r8], 'akak'
.text:0000000000E9BE29                 jnz     short loc_E9BE7B
.text:0000000000E9BE2B                 cmp     word ptr [r8+4], '21'
.text:0000000000E9BE32                 jnz     short loc_E9BE7B
.text:0000000000E9BE34                 cmp     byte ptr [r8+6], '3'
.text:0000000000E9BE39                 jnz     short loc_E9BE7B
.text:0000000000E9BE3B                 movups  [rsp+0C8h+var_58], xmm15
.text:0000000000E9BE41                 lea     rdx, unk_EA4300
.text:0000000000E9BE48                 mov     qword ptr [rsp+0C8h+var_58], rdx
.text:0000000000E9BE4D                 lea     r8, off_EDBD18  ; "You are connected to the panel\n TU AS "...
.text:0000000000E9BE54                 mov     qword ptr [rsp+0C8h+var_58+8], r8
.text:0000000000E9BE59                 mov     rbx, cs:os_Stdout
.text:0000000000E9BE60                 lea     rax, go_itab__os_File_io_Writer
.text:0000000000E9BE67                 lea     rcx, [rsp+0C8h+var_58]
.text:0000000000E9BE6C                 mov     edi, 1
.text:0000000000E9BE71                 mov     rsi, rdi
.text:0000000000E9BE74                 call    fmt_Fprintln
.text:0000000000E9BE79                 jmp     short loc_E9BE85
.text:0000000000E9BE7B ; ---------------------------------------------------------------------------
.text:0000000000E9BE7B
.text:0000000000E9BE7B loc_E9BE7B:                             ; CODE XREF: main_main+182↑j
.text:0000000000E9BE7B                                         ; main_main+18A↑j ...
.text:0000000000E9BE7B                 xor     eax, eax
.text:0000000000E9BE7D                 nop     dword ptr [rax]
.text:0000000000E9BE80                 call    os_Exit
.text:0000000000E9BE85
.text:0000000000E9BE85 loc_E9BE85:                             ; CODE XREF: main_main+1F9↑j
.text:0000000000E9BE85                 lea     rax, unk_EA4300
.text:0000000000E9BE8C                 call    runtime_newobject
.text:0000000000E9BE91                 mov     [rsp+0C8h+var_90], rax
.text:0000000000E9BE96                 mov     qword ptr [rax], 0
.text:0000000000E9BE9D                 jmp     short loc_E9BEA4
.text:0000000000E9BE9F ; ---------------------------------------------------------------------------
.text:0000000000E9BE9F
.text:0000000000E9BE9F loc_E9BE9F:                             ; CODE XREF: main_main+2B0↓j
.text:0000000000E9BE9F                                         ; main_main+2F3↓j
.text:0000000000E9BE9F                 mov     rax, [rsp+0C8h+var_90]
.text:0000000000E9BEA4
.text:0000000000E9BEA4 loc_E9BEA4:                             ; CODE XREF: main_main+21D↑j
.text:0000000000E9BEA4                 movups  [rsp+0C8h+var_68], xmm15
.text:0000000000E9BEAA                 lea     rdx, unk_EA2500
.text:0000000000E9BEB1                 mov     qword ptr [rsp+0C8h+var_68], rdx
.text:0000000000E9BEB6                 mov     qword ptr [rsp+0C8h+var_68+8], rax
.text:0000000000E9BEBB                 mov     rbx, cs:os_Stdin
.text:0000000000E9BEC2                 lea     rcx, [rsp+0C8h+var_68]
.text:0000000000E9BEC7                 mov     edi, 1
.text:0000000000E9BECC                 mov     rsi, rdi
.text:0000000000E9BECF                 lea     rax, go_itab__os_File_io_Reader
.text:0000000000E9BED6                 call    fmt_Fscanln
.text:0000000000E9BEDB                 mov     rdx, [rsp+0C8h+var_90]
.text:0000000000E9BEE0                 mov     r8, [rdx]
.text:0000000000E9BEE3                 cmp     qword ptr [rdx+8], 2
.text:0000000000E9BEE8                 jnz     short loc_E9BF35
.text:0000000000E9BEEA                 cmp     word ptr [r8], 'sl'
.text:0000000000E9BEF0                 jnz     short loc_E9BF35
.text:0000000000E9BEF2                 movups  [rsp+0C8h+var_78], xmm15
.text:0000000000E9BEF8                 lea     rdx, unk_EA4300
.text:0000000000E9BEFF                 mov     qword ptr [rsp+0C8h+var_78], rdx
.text:0000000000E9BF04                 lea     r8, off_EDBD28  ; "102108971031238349109112108101951034810"...
.text:0000000000E9BF0B                 mov     qword ptr [rsp+0C8h+var_78+8], r8
.text:0000000000E9BF10                 mov     rbx, cs:os_Stdout
.text:0000000000E9BF17                 lea     rax, go_itab__os_File_io_Writer
.text:0000000000E9BF1E                 lea     rcx, [rsp+0C8h+var_78]
.text:0000000000E9BF23                 mov     edi, 1
.text:0000000000E9BF28                 mov     rsi, rdi
.text:0000000000E9BF2B                 call    fmt_Fprintln
.text:0000000000E9BF30                 jmp     loc_E9BE9F
.text:0000000000E9BF35 ; ---------------------------------------------------------------------------
.text:0000000000E9BF35
.text:0000000000E9BF35 loc_E9BF35:                             ; CODE XREF: main_main+268↑j
.text:0000000000E9BF35                                         ; main_main+270↑j
.text:0000000000E9BF35                 movups  [rsp+0C8h+var_88], xmm15
.text:0000000000E9BF3B                 lea     rdx, unk_EA4300
.text:0000000000E9BF42                 mov     qword ptr [rsp+0C8h+var_88], rdx
.text:0000000000E9BF47                 lea     r8, off_EDBD38  ; "Command not found"
.text:0000000000E9BF4E                 mov     qword ptr [rsp+0C8h+var_88+8], r8
.text:0000000000E9BF53                 mov     rbx, cs:os_Stdout
.text:0000000000E9BF5A                 lea     rax, go_itab__os_File_io_Writer
.text:0000000000E9BF61                 lea     rcx, [rsp+0C8h+var_88]
.text:0000000000E9BF66                 mov     edi, 1
.text:0000000000E9BF6B                 mov     rsi, rdi
.text:0000000000E9BF6E                 call    fmt_Fprintln
.text:0000000000E9BF73                 jmp     loc_E9BE9F
.text:0000000000E9BF78 ; ---------------------------------------------------------------------------
.text:0000000000E9BF78
.text:0000000000E9BF78 loc_E9BF78:                             ; CODE XREF: main_main+9↑j
.text:0000000000E9BF78                 call    runtime_morestack_noctxt_abi0
.text:0000000000E9BF78 main_main       endp
.text:0000000000E9BF78

let’s break down the assembly code and understand exactly what’s going on


.text:0000000000E9BC80                 lea     r12, [rsp+var_48]; load the address of rsp + var_48 into r12
.text:0000000000E9BC85                 cmp     r12, [r14+10h] ; compare the contents of r14+10h with r12
.text:0000000000E9BC89                 jbe     loc_E9BF78     ; jump to loc_E9BF78 if the result is below or equal 
.text:0000000000E9BC8F                 sub     rsp, 0C8h      ; subtract 0xC8 from stack pointer
.text:0000000000E9BC96                 mov     [rsp+0C8h+var_8], rbp ; move the contents of the register rbp into memory rsp+0C8h+var_8
.text:0000000000E9BC9E                 lea     rbp, [rsp+0C8h+var_8] ; load the address rsp+0C8h+var_8 into register base pointer
.text:0000000000E9BCA6                 lea     rax, unk_EA4300       ; load the address of unk_EA4300 into register rax
.text:0000000000E9BCAD                 call    runtime_newobject     ; call the runtime_newobject() memory allocation function
.text:0000000000E9BCB2                 mov     [rsp+0C8h+var_A0], rax ; move the contents of the register rax into memory rsp+0C8h+var_A0
.text:0000000000E9BCB7                 mov     qword ptr [rax], 0 ; move 0 into the memory pointer of rax
.text:0000000000E9BCBE                 movups  [rsp+0C8h+var_18], xmm15 ; move register xmm15 into memory location of rsp+0C8h+var_18
.text:0000000000E9BCC7                 lea     rcx, unk_EA4300          ; stores the effective address of unk_EA4300 and stores it in rcx register
.text:0000000000E9BCCE                 mov     qword ptr [rsp+0C8h+var_18], rcx ; move the value of rck register into memory location at rsp+0C8h+var_18
.text:0000000000E9BCD6                 lea     rdx, off_EDBCF8   ; "Enter your username : " loads the address of off_EDBCF8 into the rdx register
.text:0000000000E9BCDD                 mov     qword ptr [rsp+0C8h+var_18+8], rdx ; copies the content of rdx register into memory location at [rsp+0C8h+var_18+8]
.text:0000000000E9BCE5                 mov     rbx, cs:os_Stdout ; load the ref. of standard output into rbx
.text:0000000000E9BCEC                 mov     edi, 1  ; move 1 to edi register
.text:0000000000E9BCF1                 mov     rsi, rdi ; copies the contents of rdi register to rsi
.text:0000000000E9BCF4                 lea     rax, go_itab__os_File_io_Writer ; load ref. to interface tavle and store it in rax
.text:0000000000E9BCFB                 lea     rcx, [rsp+0C8h+var_18] ; load the effective address at [rsp+0C8h+var_18] in rcx
.text:0000000000E9BD03                 call    fmt_Fprintln  ; calls the go print format function to print out the contents of rcx


this routine is done to retrieve the address of “Enter your username: “ from memory and store it in a register which is then printed by fmt_Fprintln and same time performing memory checks (Mr. memory safe ;) )


.text:0000000000E9BD11                 lea     rcx, unk_EA2500 ; loads address of unk_EA2500 in to the rcx register
.text:0000000000E9BD18                 mov     qword ptr [rsp+0C8h+var_28], rcx ; stores the value of rcx into the memory location at [rsp+0C8h+var_28]
.text:0000000000E9BD20                 mov     rdx, [rsp+0C8h+var_A0] ; move the content at  memory location [rsp+0C8h+var_A0] into rdx register
.text:0000000000E9BD25                 mov     qword ptr [rsp+0C8h+var_28+8], rdx ; move the content of rdx into the memory location fo [rsp+0C8h+var_28+8]
.text:0000000000E9BD2D                 mov     rbx, cs:os_Stdin ; calls the ref. to standard input and stores it in rbx
.text:0000000000E9BD34                 lea     rax, go_itab__os_File_io_Reader ; loads the address of file io reader to rax
.text:0000000000E9BD3B                 mov     edi, 1 ; move 1 to edi register
.text:0000000000E9BD40                 mov     rsi, rdi ; move the content of rdi register into rsi
.text:0000000000E9BD43                 lea     rcx, [rsp+0C8h+var_28] ; move the content at the memory loaction of [rsp+0C8h+var_28] into rcx
.text:0000000000E9BD4B                 call    fmt_Fscanln ; calls the golang scanln input function 

what this lines of assembly simply does is to get our response to username query input and store it into dynamically allocated memory created using runtime.newobject(); the Dynamic memory allocation variable is usually through a call to runtime.newobject(), which takes in input the description of the type to be allocated ;

this same principle is done also for the “Enter your password : “ and the input to that query which is stored for further use

the next part is the comparison which is made

.text:0000000000E9BDFD                 cmp     qword ptr [rcx+8], 5 ; compares the length of our input stored in [rcx+8] with 5
.text:0000000000E9BE02                 jnz     short loc_E9BE7B     ; jump if not equal
.text:0000000000E9BE04                 cmp     dword ptr [rdx], 'imda' ; compares the first 4 bytes (dword) with 'imba' (x86 little endian)
.text:0000000000E9BE0A                 jnz     short loc_E9BE7B        ; jump if not equal
.text:0000000000E9BE0C                 cmp     byte ptr [rdx+4], 'n'   ; compares the next byte content at memory location [rdx+4] with 'n'
.text:0000000000E9BE10                 jnz     short loc_E9BE7B        ; jumpus if not equal to
; comparision of username done
.text:0000000000E9BE12                 mov     rdx, [rsp+0C8h+var_98]  ; move the content at memory location [rdx+0C8h+var_98] to rdx
.text:0000000000E9BE17                 mov     r8, [rdx]               ; move the memory address at location [rdx] to r8
.text:0000000000E9BE1A                 cmp     qword ptr [rdx+8], 7    ; compares the size at [rdx+8] with 7
.text:0000000000E9BE1F                 nop                             ; do nothing
.text:0000000000E9BE20                 jnz     short loc_E9BE7B        ; jump if not equal
.text:0000000000E9BE22                 cmp     dword ptr [r8], 'akak'  ; comparet the 4 bytes (dword) content at [r8] with 'akak' (little endian)
.text:0000000000E9BE29                 jnz     short loc_E9BE7B        ; jump if not equal
.text:0000000000E9BE2B                 cmp     word ptr [r8+4], '21'   ; compares the 2 bytes (word) content at [r8+4] with '21' (little endian)
.text:0000000000E9BE32                 jnz     short loc_E9BE7B        ; jump if not equal
.text:0000000000E9BE34                 cmp     byte ptr [r8+6], '3'    ; compares the next byte content at memory location [rdx+4] with '3'
.text:0000000000E9BE39                 jnz     short loc_E9BE7B        ; jump if not equal
; comparision of password done

the above assembly compares the input username and password with the one stored in memory; which for each case exits the program if a mismatch is found, from above we concluded that the username is imdan and password is akak213 since for each check the length is compared (i.e. for username it’s 5 in length and for password is 7 in length)

A more illustrative explaination

we try entering the password into the program but the program just simply exits, i thinker for a little and thought why the password isn’t working, then i realize that the username is actually admin and not imda this is because we are dealing with an x86 executable and the strings are written in little-endian ; note that when a small local string is used for comparison only, no StringHeader structure gets allocated. The string comparison is done directly by machine instructions; for example, CMP [EAX], 0x64636261 to compare with “abcd” on x86

we were greeted with a text, the text probably looks like latin so let’s try translating it to english

it says we could only use the ls command in the panel, after writing the command a txt file with a decimal number name was printed out

we try deciphering the file name to Ascii characters in python and i got these:

And we finally got our flag to be flag{S1mple_g0l4ng_b1n4ry}

What a challenge, thanks for Reading

Arigato !!!!