Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

binary bomb lab phase _ 4 . please help me . i need answer.. i should input % d % d % d % d

binary bomb lab phase_4. please help me.
i need answer..
i should input %d %d %d %d %d ( i think we just need first and second integer)
Dump of assembler code for function phase_4:
=>0x000055555555575b <+0>: endbr64
0x000055555555575f <+4>: sub $0x18,%rsp
0x0000555555555763<+8>: mov %fs:0x28,%rax
0x000055555555576c <+17>: mov %rax,0x8(%rsp)
0x0000555555555771<+22>: xor %eax,%eax
0x0000555555555773<+24>: lea 0x4(%rsp),%rcx
0x0000555555555778<+29>: mov %rsp,%rdx
0x000055555555577b <+32>: lea 0x1c73(%rip),%rsi # 0x5555555573f5
0x0000555555555782<+39>: call 0x5555555552d0<__isoc99_sscanf@plt>
0x0000555555555787<+44>: cmp $0x2,%eax
0x000055555555578a <+47>: jne 0x555555555792
0x000055555555578c <+49>: cmpl $0xe,(%rsp)
0x0000555555555790<+53>: jbe 0x555555555797
0x0000555555555792<+55>: call 0x555555555d75
0x0000555555555797<+60>: mov $0xe,%edx
0x000055555555579c <+65>: mov $0x0,%esi
0x00005555555557a1<+70>: mov (%rsp),%edi
0x00005555555557a4<+73>: call 0x55555555571a
0x00005555555557a9<+78>: cmp $0x7,%eax
0x00005555555557ac <+81>: jne 0x5555555557b5
0x00005555555557ae <+83>: cmpl $0x7,0x4(%rsp)
0x00005555555557b3<+88>: je 0x5555555557ba
0x00005555555557b5<+90>: call 0x555555555d75
0x00005555555557ba <+95>: mov 0x8(%rsp),%rax
0x00005555555557bf <+100>: xor %fs:0x28,%rax
0x00005555555557c8<+109>: jne 0x5555555557cf
0x00005555555557ca <+111>: add $0x18,%rsp
0x00005555555557ce <+115>: ret
0x00005555555557cf <+116>: call 0x555555555230<__stack_chk_fail@plt>
Dump of assembler code for function func4:
0x000055555555571a <+0>: endbr64
0x000055555555571e <+4>: sub $0x8,%rsp
0x0000555555555722<+8>: mov %edx,%eax
0x0000555555555724<+10>: sub %esi,%eax
0x0000555555555726<+12>: mov %eax,%ecx
0x0000555555555728<+14>: shr $0x1f,%ecx
0x000055555555572b <+17>: add %eax,%ecx
0x000055555555572d <+19>: sar %ecx
0x000055555555572f <+21>: add %esi,%ecx
0x0000555555555731<+23>: cmp %edi,%ecx
0x0000555555555733<+25>: jg 0x555555555741
0x0000555555555735<+27>: mov $0x0,%eax
0x000055555555573a <+32>: jl 0x55555555574d
0x000055555555573c <+34>: add $0x8,%rsp
0x0000555555555740<+38>: ret
0x0000555555555741<+39>: lea -0x1(%rcx),%edx
0x0000555555555744<+42>: call 0x55555555571a
0x0000555555555749<+47>: add %eax,%eax
0x00005555555

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Web Database Development Step By Step

Authors: Jim Buyens

1st Edition

0735609667, 978-0735609662

Students also viewed these Databases questions