Question
reverseEngineering2: file format elf32-i386 Disassembly of section .init: 08048294 : 8048294: 53 push %ebx 8048295: 83 ec 08 sub $0x8,%esp 8048298: e8 83 00 00
reverseEngineering2: file format elf32-i386
Disassembly of section .init:
08048294 <_init>: 8048294: 53 push %ebx 8048295: 83 ec 08 sub $0x8,%esp 8048298: e8 83 00 00 00 call 8048320 <__x86.get_pc_thunk.bx> 804829d: 81 c3 63 1d 00 00 add $0x1d63,%ebx 80482a3: 8b 83 fc ff ff ff mov -0x4(%ebx),%eax 80482a9: 85 c0 test %eax,%eax 80482ab: 74 05 je 80482b2 <_init+0x1e> 80482ad: e8 1e 00 00 00 call 80482d0 <__gmon_start__@plt> 80482b2: 83 c4 08 add $0x8,%esp 80482b5: 5b pop %ebx 80482b6: c3 ret
Disassembly of section .plt:
080482c0 <__gmon_start__@plt-0x10>: 80482c0: ff 35 04 a0 04 08 pushl 0x804a004 80482c6: ff 25 08 a0 04 08 jmp *0x804a008 80482cc: 00 00 add %al,(%eax) ...
080482d0 <__gmon_start__@plt>: 80482d0: ff 25 0c a0 04 08 jmp *0x804a00c 80482d6: 68 00 00 00 00 push $0x0 80482db: e9 e0 ff ff ff jmp 80482c0 <_init+0x2c>
080482e0 <__libc_start_main@plt>: 80482e0: ff 25 10 a0 04 08 jmp *0x804a010 80482e6: 68 08 00 00 00 push $0x8 80482eb: e9 d0 ff ff ff jmp 80482c0 <_init+0x2c>
Disassembly of section .text:
080482f0 <_start>: 80482f0: 31 ed xor %ebp,%ebp 80482f2: 5e pop %esi 80482f3: 89 e1 mov %esp,%ecx 80482f5: 83 e4 f0 and $0xfffffff0,%esp 80482f8: 50 push %eax 80482f9: 54 push %esp 80482fa: 52 push %edx 80482fb: 68 90 84 04 08 push $0x8048490 8048300: 68 20 84 04 08 push $0x8048420 8048305: 51 push %ecx 8048306: 56 push %esi 8048307: 68 ec 83 04 08 push $0x80483ec 804830c: e8 cf ff ff ff call 80482e0 <__libc_start_main@plt> 8048311: f4 hlt 8048312: 66 90 xchg %ax,%ax 8048314: 66 90 xchg %ax,%ax 8048316: 66 90 xchg %ax,%ax 8048318: 66 90 xchg %ax,%ax 804831a: 66 90 xchg %ax,%ax 804831c: 66 90 xchg %ax,%ax 804831e: 66 90 xchg %ax,%ax
08048320 <__x86.get_pc_thunk.bx>: 8048320: 8b 1c 24 mov (%esp),%ebx 8048323: c3 ret 8048324: 66 90 xchg %ax,%ax 8048326: 66 90 xchg %ax,%ax 8048328: 66 90 xchg %ax,%ax 804832a: 66 90 xchg %ax,%ax 804832c: 66 90 xchg %ax,%ax 804832e: 66 90 xchg %ax,%ax
08048330
08048360
080483a0 <__do_global_dtors_aux>: 80483a0: 80 3d 2c a0 04 08 00 cmpb $0x0,0x804a02c 80483a7: 75 13 jne 80483bc <__do_global_dtors_aux+0x1c> 80483a9: 55 push %ebp 80483aa: 89 e5 mov %esp,%ebp 80483ac: 83 ec 08 sub $0x8,%esp 80483af: e8 7c ff ff ff call 8048330
080483c0
080483ec
08048420 <__libc_csu_init>: 8048420: 55 push %ebp 8048421: 57 push %edi 8048422: 31 ff xor %edi,%edi 8048424: 56 push %esi 8048425: 53 push %ebx 8048426: e8 f5 fe ff ff call 8048320 <__x86.get_pc_thunk.bx> 804842b: 81 c3 d5 1b 00 00 add $0x1bd5,%ebx 8048431: 83 ec 1c sub $0x1c,%esp 8048434: 8b 6c 24 30 mov 0x30(%esp),%ebp 8048438: 8d b3 04 ff ff ff lea -0xfc(%ebx),%esi 804843e: e8 51 fe ff ff call 8048294 <_init> 8048443: 8d 83 00 ff ff ff lea -0x100(%ebx),%eax 8048449: 29 c6 sub %eax,%esi 804844b: c1 fe 02 sar $0x2,%esi 804844e: 85 f6 test %esi,%esi 8048450: 74 27 je 8048479 <__libc_csu_init+0x59> 8048452: 8d b6 00 00 00 00 lea 0x0(%esi),%esi 8048458: 8b 44 24 38 mov 0x38(%esp),%eax 804845c: 89 2c 24 mov %ebp,(%esp) 804845f: 89 44 24 08 mov %eax,0x8(%esp) 8048463: 8b 44 24 34 mov 0x34(%esp),%eax 8048467: 89 44 24 04 mov %eax,0x4(%esp) 804846b: ff 94 bb 00 ff ff ff call *-0x100(%ebx,%edi,4) 8048472: 83 c7 01 add $0x1,%edi 8048475: 39 f7 cmp %esi,%edi 8048477: 75 df jne 8048458 <__libc_csu_init+0x38> 8048479: 83 c4 1c add $0x1c,%esp 804847c: 5b pop %ebx 804847d: 5e pop %esi 804847e: 5f pop %edi 804847f: 5d pop %ebp 8048480: c3 ret 8048481: eb 0d jmp 8048490 <__libc_csu_fini> 8048483: 90 nop 8048484: 90 nop 8048485: 90 nop 8048486: 90 nop 8048487: 90 nop 8048488: 90 nop 8048489: 90 nop 804848a: 90 nop 804848b: 90 nop 804848c: 90 nop 804848d: 90 nop 804848e: 90 nop 804848f: 90 nop
08048490 <__libc_csu_fini>: 8048490: f3 c3 repz ret 8048492: 66 90 xchg %ax,%ax
Disassembly of section .fini:
08048494 <_fini>: 8048494: 53 push %ebx 8048495: 83 ec 08 sub $0x8,%esp 8048498: e8 83 fe ff ff call 8048320 <__x86.get_pc_thunk.bx> 804849d: 81 c3 63 1b 00 00 add $0x1b63,%ebx 80484a3: 83 c4 08 add $0x8,%esp 80484a6: 5b pop %ebx 80484a7: c3 ret
Use Linux executable reverseEngineering2 for this question (see the Useful Files area of the Course Content for where to find the file). Run the file using gdb.
This code places the value 0xABCD into register EDI. After putting that value into EDI, the code puts 3 more values into EDI. Those values are:
Question 2 options:
| |||
| |||
| |||
|
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started