I am working on assembled-based binary bomb lab, and I am on phase 2.
How can i find answer from the below image?
Dump of assembler code for function phase 2: 0x0000000000400ee0 : 0x0000000000400eel : 0x0000000000400ee5 : 0x0000000000400ee8 : 0x0000000000400eed 0x0000000000400efa OxrO 0 0 0 0 0 0 0 0 0 4 0 0eff 0x0000000000400f04 0x0000000000400fob 0x0000000000400f0e : 0x0000000000400f15 : 0x0000000000400f19 : Type
to continue, or q to quit 0x0000000000400f21 : 0x0000000000400f23 0x0000000000400f29 cmp 0x400f19 0x400f19 mov gar add ebx, %eax %eax, 0x4 (%rbp) 0x400fob callq 0x40168f add add cmp jne 0x400efa $ 0x4 , % rbp 0x400123 mov mov 0x400efa jmp add pop %rbp retq End of assembler dump. (gdb) disas read six numbers Dump of assembler code for function read six numbers: $0x8, %rsp 0x00000000004016C5 : 0x00000000004016c9 : 0x00000000004016de 0x00000000004016e7 0x00000000004016f1 0x00000000004016f5 : 0x00000000004016fa add cmp $0x5, %eax 0x4016ff callq 0x40168f add retq $0x8, %rsp End of assembler dump. (gdb) i r rax rbx TCX 0x6 0x0 0x7fffffffea10 140737488349712 0x7fffffffea34140737488349748 0x7fffffffe410 140737488348176 0x0 0x0 0x7fffffffea180x7fffffffea18 0x0 0x7fffffffe411 140737488348177 0x0 0x6 0x400ca0 4197536 0x7fffffffeb40 140737488350016 0x0 0x0 0x40168f 0x40168f 0x297 CF PF AF SF IF ] 0x33 0x2b 0x0 0x0 0x0 6 0 rsi 0 0x0 rbp r3p r 8 r9 r10 r11 r12 r13 r14 r15 rip eflag3 C3 83 ds fs 0 0 6 0 51 43 0 0 0 Dump of assembler code for function phase 2: 0x0000000000400ee0 : 0x0000000000400eel : 0x0000000000400ee5 : 0x0000000000400ee8 : 0x0000000000400eed 0x0000000000400efa OxrO 0 0 0 0 0 0 0 0 0 4 0 0eff 0x0000000000400f04 0x0000000000400fob 0x0000000000400f0e : 0x0000000000400f15 : 0x0000000000400f19 : Type to continue, or q to quit 0x0000000000400f21 : 0x0000000000400f23 0x0000000000400f29 cmp 0x400f19 0x400f19 mov gar add ebx, %eax %eax, 0x4 (%rbp) 0x400fob callq 0x40168f add add cmp jne 0x400efa $ 0x4 , % rbp 0x400123 mov mov 0x400efa jmp add pop %rbp retq End of assembler dump. (gdb) disas read six numbers Dump of assembler code for function read six numbers: $0x8, %rsp 0x00000000004016C5 : 0x00000000004016c9 : 0x00000000004016de 0x00000000004016e7 0x00000000004016f1 0x00000000004016f5 : 0x00000000004016fa add cmp $0x5, %eax 0x4016ff callq 0x40168f add retq $0x8, %rsp End of assembler dump. (gdb) i r rax rbx TCX 0x6 0x0 0x7fffffffea10 140737488349712 0x7fffffffea34140737488349748 0x7fffffffe410 140737488348176 0x0 0x0 0x7fffffffea180x7fffffffea18 0x0 0x7fffffffe411 140737488348177 0x0 0x6 0x400ca0 4197536 0x7fffffffeb40 140737488350016 0x0 0x0 0x40168f 0x40168f 0x297 CF PF AF SF IF ] 0x33 0x2b 0x0 0x0 0x0 6 0 rsi 0 0x0 rbp r3p r 8 r9 r10 r11 r12 r13 r14 r15 rip eflag3 C3 83 ds fs 0 0 6 0 51 43 0 0 0