Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Dr. Evil binary bomb phase6 Dump of assembler code for function phase_6: 0x0000000000001838 : endbr64 0x000000000000183c : push %r15 0x000000000000183e : push %r14 0x0000000000001840 :

Dr. Evil binary bomb phase6 Dump of assembler code for function phase_6: 0x0000000000001838 <+0>: endbr64 0x000000000000183c <+4>: push %r15 0x000000000000183e <+6>: push %r14 0x0000000000001840 <+8>: push %r13 0x0000000000001842 <+10>: push %r12 0x0000000000001844 <+12>: push %rbp 0x0000000000001845 <+13>: push %rbx 0x0000000000001846 <+14>: sub $0x78,%rsp 0x000000000000184a <+18>: mov %fs:0x28,%rax 0x0000000000001853 <+27>: mov %rax,0x68(%rsp) 0x0000000000001858 <+32>: xor %eax,%eax 0x000000000000185a <+34>: lea 0x10(%rsp),%r14 0x000000000000185f <+39>: mov %r14,0x8(%rsp) 0x0000000000001864 <+44>: mov %r14,%rsi 0x0000000000001867 <+47>: call 0x1c32 0x000000000000186c <+52>: mov %r14,%r12 0x000000000000186f <+55>: mov $0x1,%r15d 0x0000000000001875 <+61>: mov %r14,%r13 0x0000000000001878 <+64>: jmp 0x1943 0x000000000000187d <+69>: call 0x1c06 0x0000000000001882 <+74>: jmp 0x1955 0x0000000000001887 <+79>: add $0x1,%rbx 0x000000000000188b <+83>: cmp $0x5,%ebx 0x000000000000188e <+86>: jg 0x193b 0x0000000000001894 <+92>: mov 0x0(%r13,%rbx,4),%eax 0x0000000000001899 <+97>: cmp %eax,0x0(%rbp) 0x000000000000189c <+100>: jne 0x1887 0x000000000000189e <+102>: call 0x1c06 0x00000000000018a3 <+107>: jmp 0x1887 0x00000000000018a5 <+109>: mov 0x8(%rsp),%rdx 0x00000000000018aa <+114>: add $0x18,%rdx 0x00000000000018ae <+118>: mov $0x7,%ecx 0x00000000000018b3 <+123>: mov %ecx,%eax 0x00000000000018b5 <+125>: sub (%r12),%eax 0x00000000000018b9 <+129>: mov %eax,(%r12) 0x00000000000018bd <+133>: add $0x4,%r12 0x00000000000018c1 <+137>: cmp %r12,%rdx 0x00000000000018c4 <+140>: jne 0x18b3 0x00000000000018c6 <+142>: mov $0x0,%esi 0x00000000000018cb <+147>: mov 0x10(%rsp,%rsi,4),%ecx 0x00000000000018cf <+151>: mov $0x1,%eax 0x00000000000018d4 <+156>: lea 0x3925(%rip),%rdx # 0x5200 0x00000000000018db <+163>: cmp $0x1,%ecx --Type for more, q to quit, c to continue without paging--c 0x00000000000018de <+166>: jle 0x18eb 0x00000000000018e0 <+168>: mov 0x8(%rdx),%rdx 0x00000000000018e4 <+172>: add $0x1,%eax 0x00000000000018e7 <+175>: cmp %ecx,%eax 0x00000000000018e9 <+177>: jne 0x18e0 0x00000000000018eb <+179>: mov %rdx,0x30(%rsp,%rsi,8) 0x00000000000018f0 <+184>: add $0x1,%rsi 0x00000000000018f4 <+188>: cmp $0x6,%rsi 0x00000000000018f8 <+192>: jne 0x18cb 0x00000000000018fa <+194>: mov 0x30(%rsp),%rbx 0x00000000000018ff <+199>: mov 0x38(%rsp),%rax 0x0000000000001904 <+204>: mov %rax,0x8(%rbx) 0x0000000000001908 <+208>: mov 0x40(%rsp),%rdx 0x000000000000190d <+213>: mov %rdx,0x8(%rax) 0x0000000000001911 <+217>: mov 0x48(%rsp),%rax 0x0000000000001916 <+222>: mov %rax,0x8(%rdx) 0x000000000000191a <+226>: mov 0x50(%rsp),%rdx 0x000000000000191f <+231>: mov %rdx,0x8(%rax) 0x0000000000001923 <+235>: mov 0x58(%rsp),%rax 0x0000000000001928 <+240>: mov %rax,0x8(%rdx) 0x000000000000192c <+244>: movq $0x0,0x8(%rax) 0x0000000000001934 <+252>: mov $0x5,%ebp 0x0000000000001939 <+257>: jmp 0x1970 0x000000000000193b <+259>: add $0x1,%r15 0x000000000000193f <+263>: add $0x4,%r14 0x0000000000001943 <+267>: mov %r14,%rbp 0x0000000000001946 <+270>: mov (%r14),%eax 0x0000000000001949 <+273>: sub $0x1,%eax 0x000000000000194c <+276>: cmp $0x5,%eax 0x000000000000194f <+279>: ja 0x187d 0x0000000000001955 <+285>: cmp $0x5,%r15d 0x0000000000001959 <+289>: jg 0x18a5 0x000000000000195f <+295>: mov %r15,%rbx 0x0000000000001962 <+298>: jmp 0x1894 0x0000000000001967 <+303>: mov 0x8(%rbx),%rbx 0x000000000000196b <+307>: sub $0x1,%ebp 0x000000000000196e <+310>: je 0x1981 0x0000000000001970 <+312>: mov 0x8(%rbx),%rax 0x0000000000001974 <+316>: mov (%rax),%eax 0x0000000000001976 <+318>: cmp %eax,(%rbx) 0x0000000000001978 <+320>: jge 0x1967 0x000000000000197a <+322>: call 0x1c06 0x000000000000197f <+327>: jmp 0x1967 0x0000000000001981 <+329>: mov 0x68(%rsp),%rax 0x0000000000001986 <+334>: sub %fs:0x28,%rax 0x000000000000198f <+343>: jne 0x19a0 0x0000000000001991 <+345>: add $0x78,%rsp 0x0000000000001995 <+349>: pop %rbx 0x0000000000001996 <+350>: pop %rbp 0x0000000000001997 <+351>: pop %r12 0x0000000000001999 <+353>: pop %r13 0x000000000000199b <+355>: pop %r14 0x000000000000199d <+357>: pop %r15 0x000000000000199f <+359>: ret 0x00000000000019a0 <+360>: call 0x1250 <__stack_chk_fail@plt>

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting

Authors: Charles T. Horngren, Walter T. Harrison

7th Edition

0132439603, 9780132439602

More Books

Students also viewed these Accounting questions

Question

Is having a positive self-concept really all that important?

Answered: 1 week ago