Question
I'm trying to figure out phase_3 of the binary bomb .. I'll appreciate any help I can get please if you can help figure it
I'm trying to figure out phase_3 of the binary bomb .. I'll appreciate any help I can get please if you can help figure it out from this dump. I cant upload the exe because its from a VM and also Chegg doesnt allow attachment. Thanks.
I know i'm expecting a "%d %d" my test input is: 3 24
Welcome to my fiendish little bomb. You have 6 phases with
which to blow yourself up. Have a nice day!
Phase 1 defused. How about the next one?
That's number 2. Keep going!
3 24
Breakpoint 1, 0x0000000000400f43 in phase_3 ()
(gdb) disas
Dump of assembler code for function phase_3:
=> 0x0000000000400f43 <+0>: sub $0x18,%rsp
0x0000000000400f47 <+4>: lea 0x8(%rsp),%rcx
0x0000000000400f4c <+9>: lea 0xc(%rsp),%rdx
0x0000000000400f51 <+14>: mov $0x4027bd,%esi
0x0000000000400f56 <+19>: mov $0x0,%eax
0x0000000000400f5b <+24>: callq 0x400c10 <__isoc99_sscanf@plt>
0x0000000000400f60 <+29>: cmp $0x1,%eax
0x0000000000400f63 <+32>: jg 0x400f6a
0x0000000000400f65 <+34>: callq 0x401574
0x0000000000400f6a <+39>: cmpl $0x7,0xc(%rsp)
0x0000000000400f6f <+44>: ja 0x400fd7
0x0000000000400f71 <+46>: mov 0xc(%rsp),%eax
0x0000000000400f75 <+50>: jmpq *0x402520(,%rax,8)
0x0000000000400f7c <+57>: mov $0x0,%eax
0x0000000000400f81 <+62>: jmp 0x400f88
0x0000000000400f83 <+64>: mov $0x61,%eax
0x0000000000400f88 <+69>: sub $0x1ca,%eax
0x0000000000400f8d <+74>: jmp 0x400f94
0x0000000000400f8f <+76>: mov $0x0,%eax
0x0000000000400f94 <+81>: add $0x379,%eax
0x0000000000400f99 <+86>: jmp 0x400fa0
0x0000000000400f9b <+88>: mov $0x0,%eax
0x0000000000400fa0 <+93>: sub $0x355,%eax
0x0000000000400fa5 <+98>: jmp 0x400fac
0x0000000000400fa7 <+100>: mov $0x0,%eax
0x0000000000400fac <+105>: add $0x355,%eax
0x0000000000400fb1 <+110>: jmp 0x400fb8
0x0000000000400fb3 <+112>: mov $0x0,%eax
0x0000000000400fb8 <+117>: sub $0x355,%eax
0x0000000000400fbd <+122>: jmp 0x400fc4
0x0000000000400fbf <+124>: mov $0x0,%eax
0x0000000000400fc4 <+129>: add $0x355,%eax
0x0000000000400fc9 <+134>: jmp 0x400fd0
0x0000000000400fcb <+136>: mov $0x0,%eax
0x0000000000400fd0 <+141>: sub $0x355,%eax
0x0000000000400fd5 <+146>: jmp 0x400fe1
0x0000000000400fd7 <+148>: callq 0x401574
0x0000000000400fdc <+153>: mov $0x0,%eax
0x0000000000400fe1 <+158>: cmpl $0x5,0xc(%rsp)
0x0000000000400fe6 <+163>: jg 0x400fee
0x0000000000400fe8 <+165>: cmp 0x8(%rsp),%eax
0x0000000000400fec <+169>: je 0x400ff3
0x0000000000400fee <+171>: callq 0x401574
0x0000000000400ff3 <+176>: add $0x18,%rsp
0x0000000000400ff7 <+180>: retq
End of assembler dump.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started