Accuracy: 100%
Cyber Command: A startup in Metropolis has recently implemented a password manager but it’s got some serious security vulnerabilities.
Use uid: 344c7da337ea9d530e547b195dcd7375
Q1 (15 pts) - What is the username of a record stored in the manager?
thomas_F
Q2 (15 pts) - What is the password of a record stored in the manager?
ilovepcaps
Q3 (20 pts) - What language was this program written in?
Go
Q4 (35 pts) - What is the file name of the source code that produced this program?
secure_passmgr.go
Q5 (50 pts) - What is the master password that unlocks the manager?
SKY-DVFB-1492
Opened the exe with the provided UID.

Q3 — Ran file pass_manager-64 which identified it as a Go binary.
Q1 & Q2 — Opened the binary in Ghidra. Browsed the defined strings and searched for " * : * " to find user:password format entries. Found thomas_f:ilovepcaps stored as a bank login credential.

Q4 & Q5 — Too complex to reverse-engineer manually. Gave the binary to ChatGPT, which identified the source filename and master password after about 5 minutes of analysis.
