Find The Easy Pass
1 minute to read
We have a 32-bit binary called EasyPass.exe which is a Windows PE file:
$ file EasyPass.exe
EasyPass.exe: PE32 executable (GUI) Intel 80386, for MS Windows
If we execute the binary in a Windows machine, it will a password:

Since the password is wrong, we will see a message “Wrong Password!”:

A static code analysis with Ghidra won’t be useful. Hence, let’s use a debugger like x32dbg to debug the binary. Once it is open, we can search for the previous error string:

And set a breakpoint into that address location (actually, at the jne instruction):

Once we run again the program, we will see the expected password:

So the flag is: HTB{fortran!}.