Question

I need help finding the input that wont result in explode_bomb in this assembly 08048cd3 <phase_4>:...

I need help finding the input that wont result in explode_bomb in this assembly

08048cd3 <phase_4>:

8048cd3: 57 push %edi

8048cd4: 56 push %esi

8048cd5: 53 push %ebx

8048cd6: 83 ec 10 sub $0x10,%esp

8048cd9: 8b 74 24 20 mov 0x20(%esp),%esi

8048cdd: 89 34 24 mov %esi,(%esp)

8048ce0: e8 f6 03 00 00 call 80490db <string_length>

8048ce5: 83 c0 01 add $0x1,%eax

8048ce8: 89 04 24 mov %eax,(%esp)

8048ceb: e8 10 fb ff ff call 8048800 <malloc@plt>

8048cf0: 89 c7 mov %eax,%edi

8048cf2: f6 06 df testb $0xdf,(%esi)

8048cf5: 74 10 je 8048d07 <phase_4+0x34>

8048cf7: 89 f3 mov %esi,%ebx

8048cf9: 83 c3 01 add $0x1,%ebx

8048cfc: f6 03 df testb $0xdf,(%ebx)

8048cff: 75 f8 jne 8048cf9 <phase_4+0x26>

8048d01: 39 de cmp %ebx,%esi

8048d03: 75 10 jne 8048d15 <phase_4+0x42>

8048d05: eb 02 jmp 8048d09 <phase_4+0x36>

8048d07: 89 f3 mov %esi,%ebx

8048d09: 8d b4 26 00 00 00 00 lea 0x0(%esi,%eiz,1),%esi

8048d10: e8 7e 06 00 00 call 8049393 <explode_bomb>

8048d15: 89 f8 mov %edi,%eax

8048d17: 89 da mov %ebx,%edx

8048d19: 83 ea 01 sub $0x1,%edx

8048d1c: 0f b6 0a movzbl (%edx),%ecx

8048d1f: 88 08 mov %cl,(%eax)

8048d21: 83 c0 01 add $0x1,%eax

8048d24: 39 f2 cmp %esi,%edx

8048d26: 75 f1 jne 8048d19 <phase_4+0x46>

8048d28: 89 d8 mov %ebx,%eax

8048d2a: 29 f0 sub %esi,%eax

8048d2c: 01 f8 add %edi,%eax

8048d2e: 0f b6 13 movzbl (%ebx),%edx

8048d31: 84 d2 test %dl,%dl

8048d33: 74 0f je 8048d44 <phase_4+0x71>

8048d35: 88 10 mov %dl,(%eax)

8048d37: 83 c0 01 add $0x1,%eax

8048d3a: 83 c3 01 add $0x1,%ebx

8048d3d: 0f b6 13 movzbl (%ebx),%edx

8048d40: 84 d2 test %dl,%dl

8048d42: 75 f1 jne 8048d35 <phase_4+0x62>

8048d44: c6 00 00 movb $0x0,(%eax)

8048d47: 89 7c 24 04 mov %edi,0x4(%esp)

8048d4b: c7 04 24 c8 a3 04 08 movl $0x804a3c8,(%esp)

8048d52: e8 a3 03 00 00 call 80490fa <strings_not_equal>

8048d57: 85 c0 test %eax,%eax

8048d59: 74 05 je 8048d60 <phase_4+0x8d>

8048d5b: e8 33 06 00 00 call 8049393 <explode_bomb>

8048d60: 83 c4 10 add $0x10,%esp

8048d63: 5b pop %ebx

8048d64: 5e pop %esi

8048d65: 5f pop %edi

8048d66: c3 ret

0 0
Add a comment Improve this question Transcribed image text
Answer #1

I need help finding the input that wont result in explode_bomb in this assembly.

Answer- 8048d5b: e8 33 06 00 00 call 8049393 <explode_bomb>

Add a comment
Know the answer?
Add Answer to:
I need help finding the input that wont result in explode_bomb in this assembly 08048cd3 <phase_4>:...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Below is the disassembled code. PLease help me to defuse the binary bomb phase_7 08048e88 <pha...

    Below is the disassembled code. PLease help me to defuse the binary bomb phase_7 08048e88 <phase_7>: 8048e88: 83 ec 2c sub $0x2c,%esp 8048e8b: 8d 44 24 18 lea 0x18(%esp),%eax 8048e8f: 89 44 24 0c mov %eax,0xc(%esp) 8048e93: 8d 44 24 1c lea 0x1c(%esp),%eax 8048e97: 89 44 24 08 mov %eax,0x8(%esp) 8048e9b: c7 44 24 04 61 a6 04 movl $0x804a661,0x4(%esp) 8048ea2: 08 8048ea3: 8b 44 24 30 mov 0x30(%esp),%eax 8048ea7: 89 04 24 mov %eax,(%esp) 8048eaa: e8 c1 f9 ff...

  • Below is the disassembled code. PLease help me to defuse the binary bomb phase_4 so the...

    Below is the disassembled code. PLease help me to defuse the binary bomb phase_4 so the right input should be  6 numbers with a certain pattern 08048cdb <phase_4>: 8048cdb: 53 push %ebx 8048cdc: 83 ec 38 sub $0x38,%esp 8048cdf: 8d 44 24 18 lea 0x18(%esp),%eax 8048ce3: 89 44 24 04 mov %eax,0x4(%esp) 8048ce7: 8b 44 24 40 mov 0x40(%esp),%eax 8048ceb: 89 04 24 mov %eax,(%esp) 8048cee: e8 11 07 00 00 call 8049404 <read_six_numbers> 8048cf3: 83 7c 24 18 00 cmpl...

  • When using objdump to disassemble the binary, how to find what the address of a specific...

    When using objdump to disassemble the binary, how to find what the address of a specific function is? For example, 08048934 <function2>: 8048934: 55 push ebp 8048935: 89 e5 mov ebp,esp 8048937: 53 push ebx 8048938: 83 ec 04 sub esp,0x4 804893b: e8 1f 00 00 00 call 804895f <__x86.get_pc_thunk.ax> 8048940: 05 c0 06 09 00 add eax,0x906c0 8048945: 83 ec 0c sub esp,0xc 8048948: 8d 90 70 31 fd ff lea edx,[eax-0x2ce90] 804894e: 52 push edx 804894f: 89 c3...

  • Binary Bomb phase 4 Dump of assembler code for function phase_4: > 0x0000000000400fe7 <+0>:     sub    $0x18,%rsp...

    Binary Bomb phase 4 Dump of assembler code for function phase_4: > 0x0000000000400fe7 <+0>:     sub    $0x18,%rsp    0x0000000000400feb <+4>:     lea    0x8(%rsp),%rcx    0x0000000000400ff0 <+9>:     lea    0xc(%rsp),%rdx    0x0000000000400ff5 <+14>:    mov    $0x40290d,%esi    0x0000000000400ffa <+19>:    mov    $0x0,%eax    0x0000000000400fff <+24>:    callq 0x400c00 <__isoc99_sscanf@plt>    0x0000000000401004 <+29>:    cmp    $0x2,%eax    0x0000000000401007 <+32>:    jne    0x401010 <phase_4+41>    0x0000000000401009 <+34>:    cmpl   $0xe,0xc(%rsp)    0x000000000040100e <+39>:    jbe    0x401015 <phase_4+46>    0x0000000000401010 <+41>:    callq 0x401662 <explode_bomb>    0x0000000000401015 <+46>:    mov    $0xe,%edx    0x000000000040101a <+51>:    mov    $0x0,%esi...

  • And also when recursive(5). Consider the following funtion int recursive(int n) f The assembly code equivalent...

    And also when recursive(5). Consider the following funtion int recursive(int n) f The assembly code equivalent of the above function is: recursive push %ebp mov %esp,%ebp push %ebx sub $0x14,%esp cmpl $0x1,0x8(%ebp) je L1 cmpl $0x2,0x8(%ebp) jne L2 L1 mov 0x8 (%ebp),%eax jmp L3 L2 mov 0x8 (%ebp),%eax sub $0x1,%eax mov %eax, (%esp call recursive mov %eax,%ebx mov ox8(%ebp),%eax sub $0x2,%eax mov %eax, (%esp call recursive imul %ebx,%eax L3 add $0x14,%esp pop %ebx pop %ebp ret

  • X86 Assembly Language Help to implement the CipherChar Procedure at the end of the given code...

    X86 Assembly Language Help to implement the CipherChar Procedure at the end of the given code INCLUDE Irvine32.inc         .data       KeyPrompt BYTE "Enter the passphrase: ",0       TextPrompt BYTE "Enter the plaintest: ",0           str1 BYTE "The passphrase has length:",0           str2 BYTE "The plaintest has length:",0       KeyIs BYTE "The passphrase: ",0       PlainTextIs BYTE "The plaintext: ",0       CipherTextIs BYTE "The ciphertext: ",0       KMAX = 64                        ; passphrase buffer maximum size       BMAX = 128                       ; test...

  • Please explain the table solution. The red answers are correct. Please explain step by step why...

    Please explain the table solution. The red answers are correct. Please explain step by step why 5) Mutually assured instruction. (10 pts) a) First, deduce the following functions. (4pts) 000000000000064a <func1>: 64a: 48 83 ec 18 sub $0x18,%rsp 64e: 89 70 24 OC mov %edi, oxc(%rsp) 652: 83 70 24 Oc 00 cmpl $0x0, xc(%rsp) 657: 75 07 jne 660 <func1+0x16> 659: b8 01 00 00 00 mov $0x1,%eax 65e: ebbe jmp 66e <func1+0x24> 660: 85 44 24 Oc mov...

  • This is phase_5 of defusing a binary bomb. (Disass in x86 on a Linux system.) I...

    This is phase_5 of defusing a binary bomb. (Disass in x86 on a Linux system.) I am having trouble "debugging" this and figuring out what I need to enter to defuse this phase, but I am relatively sure I will need 6 inputs. Thanks in advance. Dump of assembler code for function phase_5: 0x00000000004011bf <+0>: push %rbx 0x00000000004011c0 <+1>: mov %rdi,%rbx 0x00000000004011c3 <+4>: callq 0x401414 <string_length> 0x00000000004011c8 <+9>: cmp $0x6,%eax //eax = 6? jump over explode 0x00000000004011cb <+12>: je 0x4011d2...

  • Reverse Engineering

    I need to reverse engineer from machine code to C, how do I do it?This problem will give you a chance to reverse engineer a switch statement frommachine code. In the following procedure, the body of the switch statement hasbeen removed:1 int switch_prob(int x, int n)2 {3 int result = x;45 switch(n) {67 /* Fill in code here */8 }910 return result;11 }Figure 3.44 shows the disassembled machine code for the procedure. We cansee in lines 4 and 5 that...

  • I need help creating this code. Write an assembly program (MASM and Irvine's libraries) that calculates...

    I need help creating this code. Write an assembly program (MASM and Irvine's libraries) that calculates and prints out the first five Fibonacci numbers FO=0; F1=1; F2=1; F3=F1+F2; F4=F3+F2; F5=F4+F3 If we use 0, 1 and initial conditions the sequence would be: 0, 1, 1, 2, 3 Use the ebx, eax, and ecx registers. Note WriteHex, Writelnt, WriteDec, all use eax So use ebx for first and eax for second and ecx for temporary The calculation could go something like...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT