Question: I'm currently working on the assembly code-based binary bomb lab. I'm on phase 3 right now, but I'm not sure how to proceed right now.

I'm currently working on the assembly code-based binary bomb lab. I'm on phase 3 right now, but I'm not sure how to proceed right now. I know we need three numbers which output is "%d %c %d". Need help with it.

=> 0x0000000000400f5b <+0>: sub $0x18,%rsp 0x0000000000400f5f <+4>: lea 0x8(%rsp),%r8 0x0000000000400f64 <+9>: lea 0x7(%rsp),%rcx 0x0000000000400f69 <+14>: lea 0xc(%rsp),%rdx 0x0000000000400f6e <+19>: mov $0x4025f6,%esi 0x0000000000400f73 <+24>: mov $0x0,%eax 0x0000000000400f78 <+29>: callq 0x400c30 <__isoc99_sscanf@plt> 0x0000000000400f7d <+34>: cmp $0x2,%eax 0x0000000000400f80 <+37>: jg 0x400f87 0x0000000000400f82 <+39>: callq 0x401644 0x0000000000400f87 <+44>: cmpl $0x7,0xc(%rsp) 0x0000000000400f8c <+49>: ja 0x401087 0x0000000000400f92 <+55>: mov 0xc(%rsp),%eax 0x0000000000400f96 <+59>: jmpq *0x402600(,%rax,8) 0x0000000000400f9d <+66>: mov $0x7a,%eax 0x0000000000400fa2 <+71>: cmpl $0x13c,0x8(%rsp) 0x0000000000400faa <+79>: je 0x401091 0x0000000000400fb0 <+85>: callq 0x401644 0x0000000000400fb5 <+90>: mov $0x7a,%eax 0x0000000000400fba <+95>: jmpq 0x401091 0x0000000000400fbf <+100>: mov $0x71,%eax 0x0000000000400fc4 <+105>: cmpl $0x378,0x8(%rsp) 0x0000000000400fcc <+113>: je 0x401091 0x0000000000400fd2 <+119>: callq 0x401644 0x0000000000400fd7 <+124>: mov $0x71,%eax 0x0000000000400fdc <+129>: jmpq 0x401091 0x0000000000400fe1 <+134>: mov $0x65,%eax 0x0000000000400fe6 <+139>: cmpl $0xfc,0x8(%rsp) 0x0000000000400fee <+147>: je 0x401091 0x0000000000400ff4 <+153>: callq 0x401644 0x0000000000400ff9 <+158>: mov $0x65,%eax 0x0000000000400ffe <+163>: jmpq 0x401091 0x0000000000401003 <+168>: mov $0x71,%eax 0x0000000000401008 <+173>: cmpl $0x14d,0x8(%rsp) 0x0000000000401010 <+181>: je 0x401091 0x0000000000401012 <+183>: callq 0x401644 0x0000000000401017 <+188>: mov $0x71,%eax 0x000000000040101c <+193>: jmp 0x401091 0x000000000040101e <+195>: mov $0x6d,%eax 0x0000000000401023 <+200>: cmpl $0x63,0x8(%rsp) 0x0000000000401028 <+205>: je 0x401091 0x000000000040102a <+207>: callq 0x401644 0x000000000040102f <+212>: mov $0x6d,%eax 0x0000000000401034 <+217>: jmp 0x401091 0x0000000000401036 <+219>: mov $0x6c,%eax ---Type to continue, or q to quit--- 0x000000000040103b <+224>: cmpl $0x267,0x8(%rsp) 0x0000000000401043 <+232>: je 0x401091 0x0000000000401045 <+234>: callq 0x401644 0x000000000040104a <+239>: mov $0x6c,%eax 0x000000000040104f <+244>: jmp 0x401091 0x0000000000401051 <+246>: mov $0x66,%eax 0x0000000000401056 <+251>: cmpl $0x287,0x8(%rsp) 0x000000000040105e <+259>: je 0x401091 0x0000000000401060 <+261>: callq 0x401644 0x0000000000401065 <+266>: mov $0x66,%eax 0x000000000040106a <+271>: jmp 0x401091 0x000000000040106c <+273>: mov $0x79,%eax 0x0000000000401071 <+278>: cmpl $0x17c,0x8(%rsp) 0x0000000000401079 <+286>: je 0x401091 0x000000000040107b <+288>: callq 0x401644 0x0000000000401080 <+293>: mov $0x79,%eax 0x0000000000401085 <+298>: jmp 0x401091 0x0000000000401087 <+300>: callq 0x401644 0x000000000040108c <+305>: mov $0x61,%eax 0x0000000000401091 <+310>: cmp 0x7(%rsp),%al 0x0000000000401095 <+314>: je 0x40109c 0x0000000000401097 <+316>: callq 0x401644 0x000000000040109c <+321>: add $0x18,%rsp 0x00000000004010a0 <+325>: retq End of assembler dump. (gdb) x/s 0x4025f6 0x4025f6: "%d %c %d"

what kind if information you need?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!