Question: Solve this Binary Bomb lab phase 2! Breakpoint 1, 0x0000000000400f10 in phase_2 () (gdb) disas Dump of assembler code for function phase_2: => 0x0000000000400f10

Solve this Binary Bomb lab phase 2!


Breakpoint 1, 0x0000000000400f10 in phase_2 () (gdb) disas

Dump of assembler code for function phase_2:

 

=> 0x0000000000400f10 <+0>: push %rbx

 

0x0000000000400f11 +1>: sub $0x20,%rsp

 

0x0000000000400f15 +5>: mov %rsp,%rsi

 

0x0000000000400f18 +8>: callq 0x401574 <>x_numbers>

 

0x0000000000400f1d +13>: cmpl $0x0,(%rsp)

 

0x0000000000400f21 +17>: js 0x400f2a <>se_2+26>

 

0x0000000000400f23 +19>: mov $0x1,%ebx

 

0x0000000000400f28 +24>: jmp 0x400f40 

 

0x0000000000400f2a +26>: callq 0x40153e <>xplode_bomb>

 

0x0000000000400f2f <+31>: jmp 0x400f23 <>hase_2+19>

 

0x0000000000400f31 +33>: callq 0x40153e <>xplode_bomb>

 

0x0000000000400f36 +38>: add $0x1,%rbx

 

0x0000000000400f3a +42>: cmp $0x6,%rbx

 

0x0000000000400f3e +46>: je 0x400f4d <>se_2+61>

 

0x0000000000400f40 +48>: mov %ebx,% eax

 

0x0000000000400f42 +50>: add -0x4(%rsp,%rbx,4),%eax

 

0x0000000000400f46 +54>: cmp %eax,(%rsp,%rbx,4)

 

0x0000000000400f49 +57>: je 0x400f36 <>se_2+38>

 

0x0000000000400f4b +59>: jmp 0x400f31 

 

0x0000000000400f4d +61>: add $0x20,%rsp

 

0x0000000000400f51 +65>: pop %rbx

 

0x0000000000400f52 +66>: retq

 

End of assembler dump. (gdb)

 


Step by Step Solution

3.52 Rating (155 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Okay based on the disassembly this phase is checking if the numbers stored in memory at RSP are in decreasing order It does the following 1 Calls xnum... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!