Question
Binary Bomb phase 6 assembly code problem: What is the 6 digit pass number? Dump of assembler code for function phase_6: => 0x000000000040119b : push
Binary Bomb phase 6 assembly code problem:
What is the 6 digit pass number?
Dump of assembler code for function phase_6:
=> 0x000000000040119b <+0>: push %r13
0x000000000040119d <+2>: push %r12
0x000000000040119f <+4>: push %rbp
0x00000000004011a0 <+5>: push %rbx
0x00000000004011a1 <+6>: sub $0x58,%rsp
0x00000000004011a5 <+10>: lea 0x30(%rsp),%rsi
0x00000000004011aa <+15>: callq 0x40164a
0x00000000004011af <+20>: lea 0x30(%rsp),%r13
0x00000000004011b4 <+25>: mov $0x0,%r12d
0x00000000004011ba <+31>: mov %r13,%rbp
0x00000000004011bd <+34>: mov 0x0(%r13),%eax
0x00000000004011c1 <+38>: sub $0x1,%eax
0x00000000004011c4 <+41>: cmp $0x5,%eax
0x00000000004011c7 <+44>: jbe 0x4011ce
0x00000000004011c9 <+46>: callq 0x401614
0x00000000004011ce <+51>: add $0x1,%r12d
0x00000000004011d2 <+55>: cmp $0x6,%r12d
0x00000000004011d6 <+59>: jne 0x4011df
0x00000000004011d8 <+61>: mov $0x0,%esi
0x00000000004011dd <+66>: jmp 0x401221
0x00000000004011df <+68>: mov %r12d,%ebx
0x00000000004011e2 <+71>: movslq %ebx,%rax
0x00000000004011e5 <+74>: mov 0x30(%rsp,%rax,4),%eax
0x00000000004011e9 <+78>: cmp %eax,0x0(%rbp)
0x00000000004011ec <+81>: jne 0x4011f3
0x00000000004011ee <+83>: callq 0x401614
0x00000000004011f3 <+88>: add $0x1,%ebx
0x00000000004011f6 <+91>: cmp $0x5,%ebx
0x00000000004011f9 <+94>: jle 0x4011e2
0x00000000004011fb <+96>: add $0x4,%r13
0x00000000004011ff <+100>: jmp 0x4011ba
0x0000000000401201 <+102>: mov 0x8(%rdx),%rdx
0x0000000000401205 <+106>: add $0x1,%eax
0x0000000000401208 <+109>: cmp %ecx,%eax
0x000000000040120a <+111>: jne 0x401201
0x000000000040120c <+113>: jmp 0x401213
0x000000000040120e <+115>: mov $0x6042f0,%edx
0x0000000000401213 <+120>: mov %rdx,(%rsp,%rsi,2)
0x0000000000401217 <+124>: add $0x4,%rsi
0x000000000040121b <+128>: cmp $0x18,%rsi
0x000000000040121f <+132>: je 0x401236
0x0000000000401221 <+134>: mov 0x30(%rsp,%rsi,1),%ecx
0x0000000000401225 <+138>: cmp $0x1,%ecx
0x0000000000401228 <+141>: jle 0x40120e
0x000000000040122a <+143>: mov $0x1,%eax
0x000000000040122f <+148>: mov $0x6042f0,%edx
0x0000000000401234 <+153>: jmp 0x401201
0x0000000000401236 <+155>: mov (%rsp),%rbx
---Type
0x000000000040123a <+159>: lea 0x8(%rsp),%rax
0x000000000040123f <+164>: lea 0x30(%rsp),%rsi
0x0000000000401244 <+169>: mov %rbx,%rcx
0x0000000000401247 <+172>: mov (%rax),%rdx
0x000000000040124a <+175>: mov %rdx,0x8(%rcx)
0x000000000040124e <+179>: add $0x8,%rax
0x0000000000401252 <+183>: cmp %rsi,%rax
0x0000000000401255 <+186>: je 0x40125c
0x0000000000401257 <+188>: mov %rdx,%rcx
0x000000000040125a <+191>: jmp 0x401247
0x000000000040125c <+193>: movq $0x0,0x8(%rdx)
0x0000000000401264 <+201>: mov $0x5,%ebp
0x0000000000401269 <+206>: mov 0x8(%rbx),%rax
0x000000000040126d <+210>: mov (%rax),%eax
0x000000000040126f <+212>: cmp %eax,(%rbx)
0x0000000000401271 <+214>: jge 0x401278
0x0000000000401273 <+216>: callq 0x401614
0x0000000000401278 <+221>: mov 0x8(%rbx),%rbx
0x000000000040127c <+225>: sub $0x1,%ebp
0x000000000040127f <+228>: jne 0x401269
0x0000000000401281 <+230>: add $0x58,%rsp
0x0000000000401285 <+234>: pop %rbx
0x0000000000401286 <+235>: pop %rbp
0x0000000000401287 <+236>: pop %r12
0x0000000000401289 <+238>: pop %r13
0x000000000040128b <+240>: retq
End of assembler dump.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started