Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Dump of assembler code for function phase_4: => 0x08048cb4 : push %edi 0x08048cb5 : push %esi 0x08048cb6 : push %ebx 0x08048cb7 : sub $0x10,%esp 0x08048cba

Dump of assembler code for function phase_4:

=> 0x08048cb4 <+0>: push %edi

0x08048cb5 <+1>: push %esi

0x08048cb6 <+2>: push %ebx

0x08048cb7 <+3>: sub $0x10,%esp

0x08048cba <+6>: mov 0x20(%esp),%ebx

0x08048cbe <+10>: mov %ebx,(%esp)

0x08048cc1 <+13>: call 0x80490bb

0x08048cc6 <+18>: add $0x1,%eax

0x08048cc9 <+21>: mov %eax,(%esp)

0x08048ccc <+24>: call 0x8048800

0x08048cd1 <+29>: mov %eax,%edi

0x08048cd3 <+31>: movzbl (%ebx),%eax

0x08048cd6 <+34>: cmp $0x20,%al

0x08048cd8 <+36>: je 0x8048cf1

0x08048cda <+38>: mov %ebx,%esi

0x08048cdc <+40>: test %al,%al

0x08048cde <+42>: jne 0x8048ce5

0x08048ce0 <+44>: call 0x8049375

0x08048ce5 <+49>: add $0x1,%esi

0x08048ce8 <+52>: movzbl (%esi),%eax

0x08048ceb <+55>: cmp $0x20,%al

0x08048ced <+57>: jne 0x8048cdc

0x08048cef <+59>: jmp 0x8048cf3

0x08048cf1 <+61>: mov %ebx,%esi

0x08048cf3 <+63>: lea 0x1(%esi),%ecx

0x08048cf6 <+66>: movzbl 0x1(%esi),%eax

0x08048cfa <+70>: test %al,%al

0x08048cfc <+72>: je 0x8048d12

0x08048cfe <+74>: mov %edi,%edx

0x08048d00 <+76>: add $0x1,%edx

0x08048d03 <+79>: mov %al,-0x1(%edx)

0x08048d06 <+82>: add $0x1,%ecx

0x08048d09 <+85>: movzbl (%ecx),%eax

0x08048d0c <+88>: test %al,%al

0x08048d0e <+90>: jne 0x8048d00

0x08048d10 <+92>: jmp 0x8048d14

0x08048d12 <+94>: mov %edi,%edx

0x08048d14 <+96>: lea 0x1(%edx),%eax

0x08048d17 <+99>: movb $0x20,(%edx)

0x08048d1a <+102>: movzbl (%ebx),%edx

0x08048d1d <+105>: cmp $0x20,%dl

0x08048d20 <+108>: je 0x8048d33

0x08048d22 <+110>: add $0x1,%eax

0x08048d25 <+113>: mov %dl,-0x1(%eax)

0x08048d28 <+116>: add $0x1,%ebx

0x08048d2b <+119>: movzbl (%ebx),%edx

0x08048d2e <+122>: cmp $0x20,%dl

0x08048d31 <+125>: jne 0x8048d22

0x08048d33 <+127>: movb $0x0,(%eax)

0x08048d36 <+130>: mov %edi,0x4(%esp)

0x08048d3a <+134>: movl $0x804a3ac,(%esp)

0x08048d41 <+141>: call 0x80490da

0x08048d46 <+146>: test %eax,%eax

0x08048d48 <+148>: je 0x8048d4f

0x08048d4a <+150>: call 0x8049375

0x08048d4f <+155>: add $0x10,%esp

0x08048d52 <+158>: pop %ebx

0x08048d53 <+159>: pop %esi

0x08048d54 <+160>: pop %edi

0x08048d55 <+161>: ret

End of assembler dump.

Question: What does this do? The suspected string for this phase of the bomb lab is "The future will be better tomorrow." or maybe "maduiersnfotvbylSo you think you can stop the bomb with ctrl-c, do you?"

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_step_2

Step: 3

blur-text-image_step3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

What about leadership lessons from particularly good or bad bosses?

Answered: 1 week ago

Question

How would you assess the value of an approach like this?

Answered: 1 week ago