Question
is there a way to tell me what going on here this phase is very confusing i'm not sure whats going on here. I know
is there a way to tell me what going on here this phase is very confusing i'm not sure whats going on here. I know the solution is %d %c %d. my test input was: 5 b 255
Breakpoint 1, 0x0000000000400f4b in phase_3 ()
(gdb) disas
Dump of assembler code for function phase_3:
=> 0x0000000000400f4b <+0>: sub $0x18,%rsp
0x0000000000400f4f <+4>: lea 0x8(%rsp),%r8
0x0000000000400f54 <+9>: lea 0x7(%rsp),%rcx
0x0000000000400f59 <+14>: lea 0xc(%rsp),%rdx
0x0000000000400f5e <+19>: mov $0x4025b6,%esi
0x0000000000400f63 <+24>: mov $0x0,%eax
0x0000000000400f68 <+29>: callq 0x400c10 <__isoc99_sscanf@plt>
0x0000000000400f6d <+34>: cmp $0x2,%eax
0x0000000000400f70 <+37>: jg 0x400f77
0x0000000000400f72 <+39>: callq 0x401604
0x0000000000400f77 <+44>: cmpl $0x7,0xc(%rsp)
0x0000000000400f7c <+49>: ja 0x40107e
0x0000000000400f82 <+55>: mov 0xc(%rsp),%eax
0x0000000000400f86 <+59>: jmpq *0x4025c0(,%rax,8)
0x0000000000400f8d <+66>: mov $0x73,%eax
0x0000000000400f92 <+71>: cmpl $0x1c9,0x8(%rsp)
0x0000000000400f9a <+79>: je 0x401088
0x0000000000400fa0 <+85>: callq 0x401604
0x0000000000400fa5 <+90>: mov $0x73,%eax
0x0000000000400faa <+95>: jmpq 0x401088
0x0000000000400faf <+100>: mov $0x75,%eax
0x0000000000400fb4 <+105>: cmpl $0x3d8,0x8(%rsp)
0x0000000000400fbc <+113>: je 0x401088
0x0000000000400fc2 <+119>: callq 0x401604
0x0000000000400fc7 <+124>: mov $0x75,%eax
0x0000000000400fcc <+129>: jmpq 0x401088
0x0000000000400fd1 <+134>: mov $0x6e,%eax
0x0000000000400fd6 <+139>: cmpl $0x335,0x8(%rsp)
0x0000000000400fde <+147>: je 0x401088
0x0000000000400fe4 <+153>: callq 0x401604
0x0000000000400fe9 <+158>: mov $0x6e,%eax
0x0000000000400fee <+163>: jmpq 0x401088
0x0000000000400ff3 <+168>: mov $0x6b,%eax
0x0000000000400ff8 <+173>: cmpl $0xf3,0x8(%rsp)
0x0000000000401000 <+181>: je 0x401088
0x0000000000401006 <+187>: callq 0x401604
0x000000000040100b <+192>: mov $0x6b,%eax
0x0000000000401010 <+197>: jmp 0x401088
0x0000000000401012 <+199>: mov $0x76,%eax
0x0000000000401017 <+204>: cmpl $0x334,0x8(%rsp)
0x000000000040101f <+212>: je 0x401088
0x0000000000401021 <+214>: callq 0x401604
0x0000000000401026 <+219>: mov $0x76,%eax
0x000000000040102b <+224>: jmp 0x401088
0x000000000040102d <+226>: mov $0x76,%eax
0x0000000000401032 <+231>: cmpl $0xef,0x8(%rsp)
0x000000000040103a <+239>: je 0x401088
0x000000000040103c <+241>: callq 0x401604
0x0000000000401041 <+246>: mov $0x76,%eax
0x0000000000401046 <+251>: jmp 0x401088
0x0000000000401048 <+253>: mov $0x63,%eax
0x000000000040104d <+258>: cmpl $0x1e3,0x8(%rsp)
0x0000000000401055 <+266>: je 0x401088
0x0000000000401057 <+268>: callq 0x401604
0x000000000040105c <+273>: mov $0x63,%eax
0x0000000000401061 <+278>: jmp 0x401088
0x0000000000401063 <+280>: mov $0x6b,%eax
0x0000000000401068 <+285>: cmpl $0x262,0x8(%rsp)
0x0000000000401070 <+293>: je 0x401088
0x0000000000401072 <+295>: callq 0x401604
0x0000000000401077 <+300>: mov $0x6b,%eax
---Type to continue, or q to quit---
0x000000000040107c <+305>: jmp 0x401088
0x000000000040107e <+307>: callq 0x401604
0x0000000000401083 <+312>: mov $0x65,%eax
0x0000000000401088 <+317>: cmp 0x7(%rsp),%al
0x000000000040108c <+321>: je 0x401093
0x000000000040108e <+323>: callq 0x401604
0x0000000000401093 <+328>: add $0x18,%rsp
0x0000000000401097 <+332>: retq
End of assembler dump.
becasue I'm running it from a VM I can't provide the .exe and also not able to upload to chegg. check out this github link and download the files you need. if you can please provide the transcript of gdb instead of just the solution. https://github.com/luongvo209/Binary-Bomb/tree/master/1551002
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started