Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I'm trying to figure out phase_3 of the binary bomb .. I'll appreciate any help I can get please if you can help figure it

I'm trying to figure out phase_3 of the binary bomb .. I'll appreciate any help I can get please if you can help figure it out from this dump. I cant upload the exe because its from a VM and also Chegg doesnt allow attachment. Thanks.

I know i'm expecting a "%d %d" my test input is: 3 24

Welcome to my fiendish little bomb. You have 6 phases with

which to blow yourself up. Have a nice day!

Phase 1 defused. How about the next one?

That's number 2. Keep going!

3 24

Breakpoint 1, 0x0000000000400f43 in phase_3 ()

(gdb) disas

Dump of assembler code for function phase_3:

=> 0x0000000000400f43 <+0>: sub $0x18,%rsp

0x0000000000400f47 <+4>: lea 0x8(%rsp),%rcx

0x0000000000400f4c <+9>: lea 0xc(%rsp),%rdx

0x0000000000400f51 <+14>: mov $0x4027bd,%esi

0x0000000000400f56 <+19>: mov $0x0,%eax

0x0000000000400f5b <+24>: callq 0x400c10 <__isoc99_sscanf@plt>

0x0000000000400f60 <+29>: cmp $0x1,%eax

0x0000000000400f63 <+32>: jg 0x400f6a

0x0000000000400f65 <+34>: callq 0x401574

0x0000000000400f6a <+39>: cmpl $0x7,0xc(%rsp)

0x0000000000400f6f <+44>: ja 0x400fd7

0x0000000000400f71 <+46>: mov 0xc(%rsp),%eax

0x0000000000400f75 <+50>: jmpq *0x402520(,%rax,8)

0x0000000000400f7c <+57>: mov $0x0,%eax

0x0000000000400f81 <+62>: jmp 0x400f88

0x0000000000400f83 <+64>: mov $0x61,%eax

0x0000000000400f88 <+69>: sub $0x1ca,%eax

0x0000000000400f8d <+74>: jmp 0x400f94

0x0000000000400f8f <+76>: mov $0x0,%eax

0x0000000000400f94 <+81>: add $0x379,%eax

0x0000000000400f99 <+86>: jmp 0x400fa0

0x0000000000400f9b <+88>: mov $0x0,%eax

0x0000000000400fa0 <+93>: sub $0x355,%eax

0x0000000000400fa5 <+98>: jmp 0x400fac

0x0000000000400fa7 <+100>: mov $0x0,%eax

0x0000000000400fac <+105>: add $0x355,%eax

0x0000000000400fb1 <+110>: jmp 0x400fb8

0x0000000000400fb3 <+112>: mov $0x0,%eax

0x0000000000400fb8 <+117>: sub $0x355,%eax

0x0000000000400fbd <+122>: jmp 0x400fc4

0x0000000000400fbf <+124>: mov $0x0,%eax

0x0000000000400fc4 <+129>: add $0x355,%eax

0x0000000000400fc9 <+134>: jmp 0x400fd0

0x0000000000400fcb <+136>: mov $0x0,%eax

0x0000000000400fd0 <+141>: sub $0x355,%eax

0x0000000000400fd5 <+146>: jmp 0x400fe1

0x0000000000400fd7 <+148>: callq 0x401574

0x0000000000400fdc <+153>: mov $0x0,%eax

0x0000000000400fe1 <+158>: cmpl $0x5,0xc(%rsp)

0x0000000000400fe6 <+163>: jg 0x400fee

0x0000000000400fe8 <+165>: cmp 0x8(%rsp),%eax

0x0000000000400fec <+169>: je 0x400ff3

0x0000000000400fee <+171>: callq 0x401574

0x0000000000400ff3 <+176>: add $0x18,%rsp

0x0000000000400ff7 <+180>: retq

End of assembler dump.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Relational Database Technology

Authors: Suad Alagic

1st Edition

354096276X, 978-3540962762

More Books

Students also viewed these Databases questions