Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

BOMBLAB PHASE 6, PLEASE HELP!! Code is written in C and these are x86-64 assembly instructions. I need to know the six digits in order

BOMBLAB PHASE 6, PLEASE HELP!! Code is written in C and these are x86-64 assembly instructions. I need to know the six digits in order to input so that the bomb does not explode. Below is the dumb of assembler code for phase_6. Thank you! Dump of assembler code for function phase_6: =>

0x00000000004010de <+0>: push %r15 0x00000000004010e0 <+2>: push %r14 0x00000000004010e2 <+4>: push %r13 0x00000000004010e4 <+6>: push %r12 0x00000000004010e6 <+8>: push %rbp 0x00000000004010e7 <+9>: push %rbx 0x00000000004010e8 <+10>: sub $0x58,%rsp 0x00000000004010ec <+14>: lea 0x30(%rsp),%rsi 0x00000000004010f1 <+19>: callq 0x40157e 0x00000000004010f6 <+24>: lea 0x30(%rsp),%r13 0x00000000004010fb <+29>: lea 0x14(%r13),%r15 0x00000000004010ff <+33>: mov %r13,%r12 0x0000000000401102 <+36>: mov $0x1,%r14d 0x0000000000401108 <+42>: jmp 0x401132 0x000000000040110a <+44>: callq 0x401548 0x000000000040110f <+49>: jmp 0x401141 0x0000000000401111 <+51>: add $0x1,%rbx 0x0000000000401115 <+55>: cmp $0x5,%ebx 0x0000000000401118 <+58>: jg 0x40112a 0x000000000040111a <+60>: mov 0x30(%rsp,%rbx,4),%eax 0x000000000040111e <+64>: cmp %eax,0x0(%rbp) 0x0000000000401121 <+67>: jne 0x401111 0x0000000000401123 <+69>: callq 0x401548 0x0000000000401128 <+74>: jmp 0x401111 0x000000000040112a <+76>: add $0x1,%r14 0x000000000040112e <+80>: add $0x4,%r12 0x0000000000401132 <+84>: mov %r12,%rbp 0x0000000000401135 <+87>: mov (%r12),%eax 0x0000000000401139 <+91>: sub $0x1,%eax 0x000000000040113c <+94>: cmp $0x5,%eax 0x000000000040113f <+97>: ja 0x40110a 0x0000000000401141 <+99>: cmp %r15,%r12 0x0000000000401144 <+102>: je 0x40114b 0x0000000000401146 <+104>: mov %r14,%rbx 0x0000000000401149 <+107>: jmp 0x40111a 0x000000000040114b <+109>: lea 0x18(%r13),%rcx 0x000000000040114f <+113>: mov $0x7,%edx 0x0000000000401154 <+118>: mov %edx,%eax 0x0000000000401156 <+120>: sub 0x0(%r13),%eax 0x000000000040115a <+124>: mov %eax,0x0(%r13) 0x000000000040115e <+128>: add $0x4,%r13 0x0000000000401162 <+132>: cmp %r13,%rcx 0x0000000000401165 <+135>: jne 0x401154 0x0000000000401167 <+137>: mov $0x0,%esi 0x000000000040116c <+142>: mov 0x30(%rsp,%rsi,4),%ecx 0x0000000000401170 <+146>: mov $0x1,%eax 0x0000000000401175 <+151>: mov $0x6042f0,%edx --Type for more, q to quit, c to continue without paging--c 0x000000000040117a <+156>: cmp $0x1,%ecx 0x000000000040117d <+159>: jle 0x40118a 0x000000000040117f <+161>: mov 0x8(%rdx),%rdx 0x0000000000401183 <+165>: add $0x1,%eax 0x0000000000401186 <+168>: cmp %ecx,%eax 0x0000000000401188 <+170>: jne 0x40117f 0x000000000040118a <+172>: mov %rdx,(%rsp,%rsi,8) 0x000000000040118e <+176>: add $0x1,%rsi 0x0000000000401192 <+180>: cmp $0x6,%rsi 0x0000000000401196 <+184>: jne 0x40116c 0x0000000000401198 <+186>: mov (%rsp),%rbx 0x000000000040119c <+190>: mov 0x8(%rsp),%rax 0x00000000004011a1 <+195>: mov %rax,0x8(%rbx) 0x00000000004011a5 <+199>: mov 0x10(%rsp),%rdx 0x00000000004011aa <+204>: mov %rdx,0x8(%rax) 0x00000000004011ae <+208>: mov 0x18(%rsp),%rax 0x00000000004011b3 <+213>: mov %rax,0x8(%rdx) 0x00000000004011b7 <+217>: mov 0x20(%rsp),%rdx 0x00000000004011bc <+222>: mov %rdx,0x8(%rax) 0x00000000004011c0 <+226>: mov 0x28(%rsp),%rax 0x00000000004011c5 <+231>: mov %rax,0x8(%rdx) 0x00000000004011c9 <+235>: movq $0x0,0x8(%rax) 0x00000000004011d1 <+243>: mov $0x5,%ebp 0x00000000004011d6 <+248>: jmp 0x4011e1 0x00000000004011d8 <+250>: mov 0x8(%rbx),%rbx 0x00000000004011dc <+254>: sub $0x1,%ebp 0x00000000004011df <+257>: je 0x4011f2 0x00000000004011e1 <+259>: mov 0x8(%rbx),%rax 0x00000000004011e5 <+263>: mov (%rax),%eax 0x00000000004011e7 <+265>: cmp %eax,(%rbx) 0x00000000004011e9 <+267>: jge 0x4011d8 0x00000000004011eb <+269>: callq 0x401548 0x00000000004011f0 <+274>: jmp 0x4011d8 0x00000000004011f2 <+276>: add $0x58,%rsp 0x00000000004011f6 <+280>: pop %rbx 0x00000000004011f7 <+281>: pop %rbp 0x00000000004011f8 <+282>: pop %r12 0x00000000004011fa <+284>: pop %r13 0x00000000004011fc <+286>: pop %r14 0x00000000004011fe <+288>: pop %r15 0x0000000000401200 <+290>: retq End of assembler dump.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design And SQL For DB2

Authors: James Cooper

1st Edition

1583473572, 978-1583473573

More Books

Students also viewed these Databases questions