Dr. Evil binary bomb phase6 Dump of assembler code for function phase_6: 0x0000000000001838 <+0>: endbr64...

50.1K

Verified Solution

Question

Accounting

Dr. Evil binary bomb phase6 Dump of assembler code for function phase_6: 0x0000000000001838 <+0>: endbr64 0x000000000000183c <+4>: push %r15 0x000000000000183e <+6>: push %r14 0x0000000000001840 <+8>: push %r13 0x0000000000001842 <+10>: push %r12 0x0000000000001844 <+12>: push %rbp 0x0000000000001845 <+13>: push %rbx 0x0000000000001846 <+14>: sub $0x78,%rsp 0x000000000000184a <+18>: mov %fs:0x28,%rax 0x0000000000001853 <+27>: mov %rax,0x68(%rsp) 0x0000000000001858 <+32>: xor %eax,%eax 0x000000000000185a <+34>: lea 0x10(%rsp),%r14 0x000000000000185f <+39>: mov %r14,0x8(%rsp) 0x0000000000001864 <+44>: mov %r14,%rsi 0x0000000000001867 <+47>: call 0x1c32 0x000000000000186c <+52>: mov %r14,%r12 0x000000000000186f <+55>: mov $0x1,%r15d 0x0000000000001875 <+61>: mov %r14,%r13 0x0000000000001878 <+64>: jmp 0x1943 0x000000000000187d <+69>: call 0x1c06 0x0000000000001882 <+74>: jmp 0x1955 0x0000000000001887 <+79>: add $0x1,%rbx 0x000000000000188b <+83>: cmp $0x5,%ebx 0x000000000000188e <+86>: jg 0x193b 0x0000000000001894 <+92>: mov 0x0(%r13,%rbx,4),%eax 0x0000000000001899 <+97>: cmp %eax,0x0(%rbp) 0x000000000000189c <+100>: jne 0x1887 0x000000000000189e <+102>: call 0x1c06 0x00000000000018a3 <+107>: jmp 0x1887 0x00000000000018a5 <+109>: mov 0x8(%rsp),%rdx 0x00000000000018aa <+114>: add $0x18,%rdx 0x00000000000018ae <+118>: mov $0x7,%ecx 0x00000000000018b3 <+123>: mov %ecx,%eax 0x00000000000018b5 <+125>: sub (%r12),%eax 0x00000000000018b9 <+129>: mov %eax,(%r12) 0x00000000000018bd <+133>: add $0x4,%r12 0x00000000000018c1 <+137>: cmp %r12,%rdx 0x00000000000018c4 <+140>: jne 0x18b3 0x00000000000018c6 <+142>: mov $0x0,%esi 0x00000000000018cb <+147>: mov 0x10(%rsp,%rsi,4),%ecx 0x00000000000018cf <+151>: mov $0x1,%eax 0x00000000000018d4 <+156>: lea 0x3925(%rip),%rdx # 0x5200 0x00000000000018db <+163>: cmp $0x1,%ecx --Type for more, q to quit, c to continue without paging--c 0x00000000000018de <+166>: jle 0x18eb 0x00000000000018e0 <+168>: mov 0x8(%rdx),%rdx 0x00000000000018e4 <+172>: add $0x1,%eax 0x00000000000018e7 <+175>: cmp %ecx,%eax 0x00000000000018e9 <+177>: jne 0x18e0 0x00000000000018eb <+179>: mov %rdx,0x30(%rsp,%rsi,8) 0x00000000000018f0 <+184>: add $0x1,%rsi 0x00000000000018f4 <+188>: cmp $0x6,%rsi 0x00000000000018f8 <+192>: jne 0x18cb 0x00000000000018fa <+194>: mov 0x30(%rsp),%rbx 0x00000000000018ff <+199>: mov 0x38(%rsp),%rax 0x0000000000001904 <+204>: mov %rax,0x8(%rbx) 0x0000000000001908 <+208>: mov 0x40(%rsp),%rdx 0x000000000000190d <+213>: mov %rdx,0x8(%rax) 0x0000000000001911 <+217>: mov 0x48(%rsp),%rax 0x0000000000001916 <+222>: mov %rax,0x8(%rdx) 0x000000000000191a <+226>: mov 0x50(%rsp),%rdx 0x000000000000191f <+231>: mov %rdx,0x8(%rax) 0x0000000000001923 <+235>: mov 0x58(%rsp),%rax 0x0000000000001928 <+240>: mov %rax,0x8(%rdx) 0x000000000000192c <+244>: movq $0x0,0x8(%rax) 0x0000000000001934 <+252>: mov $0x5,%ebp 0x0000000000001939 <+257>: jmp 0x1970 0x000000000000193b <+259>: add $0x1,%r15 0x000000000000193f <+263>: add $0x4,%r14 0x0000000000001943 <+267>: mov %r14,%rbp 0x0000000000001946 <+270>: mov (%r14),%eax 0x0000000000001949 <+273>: sub $0x1,%eax 0x000000000000194c <+276>: cmp $0x5,%eax 0x000000000000194f <+279>: ja 0x187d 0x0000000000001955 <+285>: cmp $0x5,%r15d 0x0000000000001959 <+289>: jg 0x18a5 0x000000000000195f <+295>: mov %r15,%rbx 0x0000000000001962 <+298>: jmp 0x1894 0x0000000000001967 <+303>: mov 0x8(%rbx),%rbx 0x000000000000196b <+307>: sub $0x1,%ebp 0x000000000000196e <+310>: je 0x1981 0x0000000000001970 <+312>: mov 0x8(%rbx),%rax 0x0000000000001974 <+316>: mov (%rax),%eax 0x0000000000001976 <+318>: cmp %eax,(%rbx) 0x0000000000001978 <+320>: jge 0x1967 0x000000000000197a <+322>: call 0x1c06 0x000000000000197f <+327>: jmp 0x1967 0x0000000000001981 <+329>: mov 0x68(%rsp),%rax 0x0000000000001986 <+334>: sub %fs:0x28,%rax 0x000000000000198f <+343>: jne 0x19a0 0x0000000000001991 <+345>: add $0x78,%rsp 0x0000000000001995 <+349>: pop %rbx 0x0000000000001996 <+350>: pop %rbp 0x0000000000001997 <+351>: pop %r12 0x0000000000001999 <+353>: pop %r13 0x000000000000199b <+355>: pop %r14 0x000000000000199d <+357>: pop %r15 0x000000000000199f <+359>: ret 0x00000000000019a0 <+360>: call 0x1250 <__stack_chk_fail@plt>

Answer & Explanation Solved by verified expert
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students