Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

anyone can help me with assignment called bomb lab where we have to look through assembly language code and find the passwords. I've been stuck

anyone can help me with assignment called bomb lab where we have to look through assembly language code and find the passwords. I've been stuck on phase 2 . I have to find 6 integers in the right order to pass this phase. any help pleaseeeeeeimage text in transcribedimage text in transcribedimage text in transcribed

systems3:~> gdb bomb GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc License GPLv3+ GNU GPL version 3 or later This is free software: you are free to change and redistribute it There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details This GDB was configured as "x86-64-Linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: Find the GDB manual and other documentation resources online at: For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from bomb...done. (gdb) b phase_2 Breakpoint 1 at 0x400edf (gdb) r pu.txt Starting program: fsdirs/home4/home4/ugrad4/hthan/bomb pu.txt Welcome to my fiendish little bomb. You have 6 phases with which to blow yourself up. Have a nice day! Phase 1 defused. How about the next one? 1 2 3 4 5 6 Breakpoint 1, 0x0000000000400edf in phase_2) (gdb) disas Dump of assembler code for function phase_2: => 0x0000000000400edf : push push sub mov callq %rbp %rbx $0x28,%rsp %rsp,ersi 0x0000000000400ee0 0x0000000000400ee1 0x0000000000400ee5 0x0000000000400ee8 : 0x0000000000400eed :Cmpl $0x14, (%rsp) 0x0000000000400ef1 0x0000000000400ef3 : 0x000000000040ef8 :jmp0x400f17 0x0000000000400efa ; 0x0000000000400efc : add 0x0(%rbp),%eax 0x8000000000400eff: cmp %eax , 0x4 (%rbp) 0x0000000000400f02 :je 0x0000000000400f04 0x0000000000400f09 :add $0x1,sebx 0x0000000000400f0c ; 0x0000000000400f10: cmp $0x6 , %ebx 0x0000000000400f13 0x0000000000400f1554>: jmp 0x400f21 ; 0x0000000000400f1a :mov $0x1,%ebx 0x4016b5 0x400f17 callq 0x40167f mov %ebx, %eax 0x400f09 add jne 0x400efa $0x4, % rbp mov Breakpoint 1, 0x0000000000400edf in phase_2 ) (gdb) disas Dump of assembler code for function phase_2: 0x0000000000400edf 0x0000000000400ee0 0x0000000000400ee1 0x0000000000400ee5 : 0x0000000000400ee8 0x0000000000400eed : 0x0000000000400ef3 0x000000000040ef8 :jmp0x400f17 0x0000000000400efa : 0x0000000000400efc : add 0x8(%rbp),%eax 0x0000000000400eff : cmp %eax,0x4(%rbp) 0x0000000000400f02 : 0x0000000000400f04 0x0000000000400f09 : add $0x1,%ebx 0x0000000000400f0c :add$0x4,%rbp 0x0000000000400f10 0x0000000000400f13 :jne0x400efa : 0x0000000000400f17 0x0000000000400f1a : mov $0x1,%ebx 0x0000000000400f1f : push %rbp push %rbx sub $0x28,%rsp mov callq 0x4016b5 > : orsp,rsi 0x400f17 callq 0x40167f mov sebx,%eax 0x400f09 callq 0x40167f $0x6, %ebx jmp mov 0x400f21 %rsp,%rbp jmp 0x400efa Type to continue, or q to quit 0x0000000000400f21 : 0x0000000000400f25 : 0x0000000000400f26 0x0000000000400127 +72 add pop pop %rbp retq $0x28,%rsp rbx End of assembler dump. (gdb) until *0x0000000000400eed 0x0000000000400eed in phase_2 () (gdb) disas Dump of assembler code for function phase_2: 0x0000000000400edf 0x0000000000400ee0 ; 0x0000000000400ee1 0x0000000000400ee5 : 0x0000000000400ee8 : 0x0000000000400eed 0x0000000000400ef1 0x0000000000400ef3 : 0x0000000000400ef8 : 0x0000000000400efa : 0x0000000000400efc : 0x0000000000400eff: 0x0000000000400f02 0x0000000000400f04 push push sub mov callq cmpl j g callq 0x40167f jmp 0x400f17 mov add cmp %rbp %rbx $0x28,%rsp %rsp,%rsi 0x4016b5 $0x14 ,(%rsp) 0x400f17 > : %ebx, %eax 0x0(%rbp),%eax %eax,0x4(%rbp) 0x400f09 callq 0x40167f 0x0000000000400ee8 : 0x0000000000400eed 0x0000000000400ef1 :jg 0x0000000000400ef3 : 0x0000000000400ef8 :jmp0x400f17 0x0000000000400efa : 0x0000000000400efc : 0x0000000000400eff: cmp %eax,0x4 ( %rbp) 0x0000000000400f02 :je 0x0000000000400f04 : 0x0000000000400f09 : 0x0000000000400f0c 45>: 0x0000000000400f10 :jne0x400efa 0x8000000000400f15 0x0000000000400f17 : 0x0000000000400f1a : 0x0000000000400f1f :jmp0x400efa callq 0x4016b5 cmpl $0x14,(%rsp) 0x400f17 => : callq 0x40167f %ebx, %eax 0x0(%rbp),%eax mov add 0x400f09 callq 0x40167f add $0x1,%ebx add $0x4,srbp cmp $0x6,%ebx mov mov $0x1,%ebx Type to continue, or q to quit- 0x0000000000400121 662: 0x0000000000400125 +70>: 0x0000000000400f26 ;: 0x0000000000400f27 : add pop pop retq $0x28,8rsp %rbp End of assembler dump. (gdb) i r rax rbx rcx rdx rsi rdi 0x7fffffffeb68 140737488350056 0x7fffffffea30 140737488349744 0x7fffffffea54 140737488349780 0x7fffffffe430 140737488348208 0x0 rsp 0x7 fffffffea40 0x7 fffffffea40 r10 r11 r12 r13 r14 r15 0x7fffffffe431 140737488348209 0x0 0x6 0x400ca0 4197536 0x7fffffffeb60 140737488350048 0x400eed 0x400eed 0x202 IF ] 0x33 0x2b eflags 51 43 CS es 0x0 -Type to continue, or q to quit-- systems3:~> gdb bomb GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc License GPLv3+ GNU GPL version 3 or later This is free software: you are free to change and redistribute it There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details This GDB was configured as "x86-64-Linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: Find the GDB manual and other documentation resources online at: For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from bomb...done. (gdb) b phase_2 Breakpoint 1 at 0x400edf (gdb) r pu.txt Starting program: fsdirs/home4/home4/ugrad4/hthan/bomb pu.txt Welcome to my fiendish little bomb. You have 6 phases with which to blow yourself up. Have a nice day! Phase 1 defused. How about the next one? 1 2 3 4 5 6 Breakpoint 1, 0x0000000000400edf in phase_2) (gdb) disas Dump of assembler code for function phase_2: => 0x0000000000400edf : push push sub mov callq %rbp %rbx $0x28,%rsp %rsp,ersi 0x0000000000400ee0 0x0000000000400ee1 0x0000000000400ee5 0x0000000000400ee8 : 0x0000000000400eed :Cmpl $0x14, (%rsp) 0x0000000000400ef1 0x0000000000400ef3 : 0x000000000040ef8 :jmp0x400f17 0x0000000000400efa ; 0x0000000000400efc : add 0x0(%rbp),%eax 0x8000000000400eff: cmp %eax , 0x4 (%rbp) 0x0000000000400f02 :je 0x0000000000400f04 0x0000000000400f09 :add $0x1,sebx 0x0000000000400f0c ; 0x0000000000400f10: cmp $0x6 , %ebx 0x0000000000400f13 0x0000000000400f1554>: jmp 0x400f21 ; 0x0000000000400f1a :mov $0x1,%ebx 0x4016b5 0x400f17 callq 0x40167f mov %ebx, %eax 0x400f09 add jne 0x400efa $0x4, % rbp mov Breakpoint 1, 0x0000000000400edf in phase_2 ) (gdb) disas Dump of assembler code for function phase_2: 0x0000000000400edf 0x0000000000400ee0 0x0000000000400ee1 0x0000000000400ee5 : 0x0000000000400ee8 0x0000000000400eed : 0x0000000000400ef3 0x000000000040ef8 :jmp0x400f17 0x0000000000400efa : 0x0000000000400efc : add 0x8(%rbp),%eax 0x0000000000400eff : cmp %eax,0x4(%rbp) 0x0000000000400f02 : 0x0000000000400f04 0x0000000000400f09 : add $0x1,%ebx 0x0000000000400f0c :add$0x4,%rbp 0x0000000000400f10 0x0000000000400f13 :jne0x400efa : 0x0000000000400f17 0x0000000000400f1a : mov $0x1,%ebx 0x0000000000400f1f : push %rbp push %rbx sub $0x28,%rsp mov callq 0x4016b5 > : orsp,rsi 0x400f17 callq 0x40167f mov sebx,%eax 0x400f09 callq 0x40167f $0x6, %ebx jmp mov 0x400f21 %rsp,%rbp jmp 0x400efa Type to continue, or q to quit 0x0000000000400f21 : 0x0000000000400f25 : 0x0000000000400f26 0x0000000000400127 +72 add pop pop %rbp retq $0x28,%rsp rbx End of assembler dump. (gdb) until *0x0000000000400eed 0x0000000000400eed in phase_2 () (gdb) disas Dump of assembler code for function phase_2: 0x0000000000400edf 0x0000000000400ee0 ; 0x0000000000400ee1 0x0000000000400ee5 : 0x0000000000400ee8 : 0x0000000000400eed 0x0000000000400ef1 0x0000000000400ef3 : 0x0000000000400ef8 : 0x0000000000400efa : 0x0000000000400efc : 0x0000000000400eff: 0x0000000000400f02 0x0000000000400f04 push push sub mov callq cmpl j g callq 0x40167f jmp 0x400f17 mov add cmp %rbp %rbx $0x28,%rsp %rsp,%rsi 0x4016b5 $0x14 ,(%rsp) 0x400f17 > : %ebx, %eax 0x0(%rbp),%eax %eax,0x4(%rbp) 0x400f09 callq 0x40167f 0x0000000000400ee8 : 0x0000000000400eed 0x0000000000400ef1 :jg 0x0000000000400ef3 : 0x0000000000400ef8 :jmp0x400f17 0x0000000000400efa : 0x0000000000400efc : 0x0000000000400eff: cmp %eax,0x4 ( %rbp) 0x0000000000400f02 :je 0x0000000000400f04 : 0x0000000000400f09 : 0x0000000000400f0c 45>: 0x0000000000400f10 :jne0x400efa 0x8000000000400f15 0x0000000000400f17 : 0x0000000000400f1a : 0x0000000000400f1f :jmp0x400efa callq 0x4016b5 cmpl $0x14,(%rsp) 0x400f17 => : callq 0x40167f %ebx, %eax 0x0(%rbp),%eax mov add 0x400f09 callq 0x40167f add $0x1,%ebx add $0x4,srbp cmp $0x6,%ebx mov mov $0x1,%ebx Type to continue, or q to quit- 0x0000000000400121 662: 0x0000000000400125 +70>: 0x0000000000400f26 ;: 0x0000000000400f27 : add pop pop retq $0x28,8rsp %rbp End of assembler dump. (gdb) i r rax rbx rcx rdx rsi rdi 0x7fffffffeb68 140737488350056 0x7fffffffea30 140737488349744 0x7fffffffea54 140737488349780 0x7fffffffe430 140737488348208 0x0 rsp 0x7 fffffffea40 0x7 fffffffea40 r10 r11 r12 r13 r14 r15 0x7fffffffe431 140737488348209 0x0 0x6 0x400ca0 4197536 0x7fffffffeb60 140737488350048 0x400eed 0x400eed 0x202 IF ] 0x33 0x2b eflags 51 43 CS es 0x0 -Type to continue, or q to quit

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data And Information Quality Dimensions, Principles And Techniques

Authors: Carlo Batini, Monica Scannapieco

1st Edition

3319241060, 9783319241067

More Books

Students also viewed these Databases questions

Question

What are black and white images

Answered: 1 week ago