wannaGOwithme (Reverse)

wannaGOwithme solution (easy).

We see a binary, which is probably written in GO, because of the question's name, running it only give us the following:

./wannaGOwithme 

luv u ^_^

Let's open it in Ghidra:

Functions in Ghidra

Checking the functions, we see the main, and a function called "solve", which has an array called DAT_00480d68 and first character is it t which can hint us towards the flag, so checking the array in the assembly view in Ghidra we see:

Showing the array

We see the flag is stored there in hex, and being rendered, so we can just copy the whole thing (copy "byte string"), and put it in CyberChef to convert to ASCII and remove null bytes:

The flag

Last updated