Question: Binary Bomb phase 6 assembly code problem: What is the 6 digit pass number? Dump of assembler code for function phase_6: => 0x000000000040119b : push

Binary Bomb phase 6 assembly code problem:

What is the 6 digit pass number?

Dump of assembler code for function phase_6:

=> 0x000000000040119b <+0>: push %r13

0x000000000040119d <+2>: push %r12

0x000000000040119f <+4>: push %rbp

0x00000000004011a0 <+5>: push %rbx

0x00000000004011a1 <+6>: sub $0x58,%rsp

0x00000000004011a5 <+10>: lea 0x30(%rsp),%rsi

0x00000000004011aa <+15>: callq 0x40164a

0x00000000004011af <+20>: lea 0x30(%rsp),%r13

0x00000000004011b4 <+25>: mov $0x0,%r12d

0x00000000004011ba <+31>: mov %r13,%rbp

0x00000000004011bd <+34>: mov 0x0(%r13),%eax

0x00000000004011c1 <+38>: sub $0x1,%eax

0x00000000004011c4 <+41>: cmp $0x5,%eax

0x00000000004011c7 <+44>: jbe 0x4011ce

0x00000000004011c9 <+46>: callq 0x401614

0x00000000004011ce <+51>: add $0x1,%r12d

0x00000000004011d2 <+55>: cmp $0x6,%r12d

0x00000000004011d6 <+59>: jne 0x4011df

0x00000000004011d8 <+61>: mov $0x0,%esi

0x00000000004011dd <+66>: jmp 0x401221

0x00000000004011df <+68>: mov %r12d,%ebx

0x00000000004011e2 <+71>: movslq %ebx,%rax

0x00000000004011e5 <+74>: mov 0x30(%rsp,%rax,4),%eax

0x00000000004011e9 <+78>: cmp %eax,0x0(%rbp)

0x00000000004011ec <+81>: jne 0x4011f3

0x00000000004011ee <+83>: callq 0x401614

0x00000000004011f3 <+88>: add $0x1,%ebx

0x00000000004011f6 <+91>: cmp $0x5,%ebx

0x00000000004011f9 <+94>: jle 0x4011e2

0x00000000004011fb <+96>: add $0x4,%r13

0x00000000004011ff <+100>: jmp 0x4011ba

0x0000000000401201 <+102>: mov 0x8(%rdx),%rdx

0x0000000000401205 <+106>: add $0x1,%eax

0x0000000000401208 <+109>: cmp %ecx,%eax

0x000000000040120a <+111>: jne 0x401201

0x000000000040120c <+113>: jmp 0x401213

0x000000000040120e <+115>: mov $0x6042f0,%edx

0x0000000000401213 <+120>: mov %rdx,(%rsp,%rsi,2)

0x0000000000401217 <+124>: add $0x4,%rsi

0x000000000040121b <+128>: cmp $0x18,%rsi

0x000000000040121f <+132>: je 0x401236

0x0000000000401221 <+134>: mov 0x30(%rsp,%rsi,1),%ecx

0x0000000000401225 <+138>: cmp $0x1,%ecx

0x0000000000401228 <+141>: jle 0x40120e

0x000000000040122a <+143>: mov $0x1,%eax

0x000000000040122f <+148>: mov $0x6042f0,%edx

0x0000000000401234 <+153>: jmp 0x401201

0x0000000000401236 <+155>: mov (%rsp),%rbx

---Type to continue, or q to quit---

0x000000000040123a <+159>: lea 0x8(%rsp),%rax

0x000000000040123f <+164>: lea 0x30(%rsp),%rsi

0x0000000000401244 <+169>: mov %rbx,%rcx

0x0000000000401247 <+172>: mov (%rax),%rdx

0x000000000040124a <+175>: mov %rdx,0x8(%rcx)

0x000000000040124e <+179>: add $0x8,%rax

0x0000000000401252 <+183>: cmp %rsi,%rax

0x0000000000401255 <+186>: je 0x40125c

0x0000000000401257 <+188>: mov %rdx,%rcx

0x000000000040125a <+191>: jmp 0x401247

0x000000000040125c <+193>: movq $0x0,0x8(%rdx)

0x0000000000401264 <+201>: mov $0x5,%ebp

0x0000000000401269 <+206>: mov 0x8(%rbx),%rax

0x000000000040126d <+210>: mov (%rax),%eax

0x000000000040126f <+212>: cmp %eax,(%rbx)

0x0000000000401271 <+214>: jge 0x401278

0x0000000000401273 <+216>: callq 0x401614

0x0000000000401278 <+221>: mov 0x8(%rbx),%rbx

0x000000000040127c <+225>: sub $0x1,%ebp

0x000000000040127f <+228>: jne 0x401269

0x0000000000401281 <+230>: add $0x58,%rsp

0x0000000000401285 <+234>: pop %rbx

0x0000000000401286 <+235>: pop %rbp

0x0000000000401287 <+236>: pop %r12

0x0000000000401289 <+238>: pop %r13

0x000000000040128b <+240>: retq

End of assembler dump.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!