简体   繁体   中英

reverse engineering in C; bomb lab

I am doing a lab for my cs class and we are reverse engineering a "binary bomb". I am confused on a few assembler instructions. If anyone could explain what these do and how the work I would greatly appreciate it.

lea   0x10(%rbx), %rbp. 

Im pretty sure rbx is supposed to hold the address of rbp, but im confused on the 0x10 argument.

mov   0x4(%rbx), %eax. 

Same thing as above, don't understand what the 0x4 argument is.

These are offsets (0x10 = 16bytes and 0x4=4bytes) to the pointers in rbp and eax. Most likely iterating over elements in an array/vector.

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM