簡體   English   中英

第三階段二進制炸彈組裝

[英]Phase 3 Binary Bomb Assembly

我在拆卸此代碼時遇到了很大的困難。 我了解該函數需要3個輸入,1個小數和2個字符。 我得出的結論是,十進制為7,盡管我不能完全確定這是正確的。 我知道我必須在某個地方使用跳轉表,我相信它位於0x08048d50處,我想再次進行驗證和更正,但是我不確定如何鍵入命令?

Dump of assembler code for function phase_3:
0x08048cfa <+0>:    push   %ebp
0x08048cfb <+1>:    mov    %esp,%ebp
0x08048cfd <+3>:    sub    $0x38,%esp
=>  0x08048d00 <+6>:    movl   $0x0,-0xc(%ebp)
0x08048d07 <+13>:   lea    -0x12(%ebp),%eax
0x08048d0a <+16>:   mov    %eax,0x10(%esp)
0x08048d0e <+20>:   lea    -0x13(%ebp),%eax
0x08048d11 <+23>:   mov    %eax,0xc(%esp)
0x08048d15 <+27>:   lea    -0x10(%ebp),%eax
0x08048d18 <+30>:   mov    %eax,0x8(%esp)
0x08048d1c <+34>:   movl   $0x804a7ff,0x4(%esp)
0x08048d24 <+42>:   mov    0x8(%ebp),%eax
0x08048d27 <+45>:   mov    %eax,(%esp)
0x08048d2a <+48>:   call   0x8048960 <__isoc99_sscanf@plt>
0x08048d2f <+53>:   mov    %eax,-0xc(%ebp)
0x08048d32 <+56>:   cmpl   $0x2,-0xc(%ebp)
0x08048d36 <+60>:   jg     0x8048d3d <phase_3+67>
0x08048d38 <+62>:   call   0x8049675 <explode_bomb>
0x08048d3d <+67>:   mov    -0x10(%ebp),%eax
0x08048d40 <+70>:   cmp    $0x7,%eax
0x08048d43 <+73>:   ja     0x8048e56 <phase_3+348>
0x08048d49 <+79>:   mov    0x804a808(,%eax,4),%eax
0x08048d50 <+86>:   jmp    *%eax
0x08048d52 <+88>:   movb   $0x6d,-0x11(%ebp)
0x08048d56 <+92>:   movzbl -0x12(%ebp),%eax
0x08048d5a <+96>:   movsbl %al,%eax
0x08048d5d <+99>:   lea    0x20(%eax),%edx
0x08048d60 <+102>:  movsbl -0x11(%ebp),%eax
0x08048d64 <+106>:  cmp    %eax,%edx
0x08048d66 <+108>:  je     0x8048e61 <phase_3+359>
0x08048d6c <+114>:  call   0x8049675 <explode_bomb>
0x08048d71 <+119>:  jmp    0x8048e61 <phase_3+359>
0x08048d76 <+124>:  movb   $0x68,-0x11(%ebp)
0x08048d7a <+128>:  movzbl -0x12(%ebp),%eax
0x08048d7e <+132>:  movsbl %al,%eax
0x08048d81 <+135>:  lea    0x20(%eax),%edx
0x08048d84 <+138>:  movsbl -0x11(%ebp),%eax
---Type <return> to continue, or q <return> to quit---
0x08048d88 <+142>:  cmp    %eax,%edx
0x08048d8a <+144>:  je     0x8048e64 <phase_3+362>
0x08048d90 <+150>:  call   0x8049675 <explode_bomb>
0x08048d95 <+155>:  jmp    0x8048e64 <phase_3+362>
0x08048d9a <+160>:  movb   $0x63,-0x11(%ebp)
0x08048d9e <+164>:  movzbl -0x12(%ebp),%eax
0x08048da2 <+168>:  movsbl %al,%eax
0x08048da5 <+171>:  lea    0x20(%eax),%edx
0x08048da8 <+174>:  movsbl -0x11(%ebp),%eax
0x08048dac <+178>:  cmp    %eax,%edx
0x08048dae <+180>:  je     0x8048e67 <phase_3+365>
0x08048db4 <+186>:  call   0x8049675 <explode_bomb>
0x08048db9 <+191>:  jmp    0x8048e67 <phase_3+365>
0x08048dbe <+196>:  movb   $0x6f,-0x11(%ebp)
0x08048dc2 <+200>:  movzbl -0x12(%ebp),%eax
0x08048dc6 <+204>:  movsbl %al,%eax
0x08048dc9 <+207>:  lea    0x20(%eax),%edx
0x08048dcc <+210>:  movsbl -0x11(%ebp),%eax
0x08048dd0 <+214>:  cmp    %eax,%edx
0x08048dd2 <+216>:  je     0x8048e6a <phase_3+368>
0x08048dd8 <+222>:  call   0x8049675 <explode_bomb>
0x08048ddd <+227>:  jmp    0x8048e6a <phase_3+368>
0x08048de2 <+232>:  movb   $0x6d,-0x11(%ebp)
0x08048de6 <+236>:  movzbl -0x12(%ebp),%eax
0x08048dea <+240>:  movsbl %al,%eax
0x08048ded <+243>:  lea    0x20(%eax),%edx
0x08048df0 <+246>:  movsbl -0x11(%ebp),%eax
0x08048df4 <+250>:  cmp    %eax,%edx
0x08048df6 <+252>:  je     0x8048e6d <phase_3+371>
0x08048df8 <+254>:  call   0x8049675 <explode_bomb>
0x08048dfd <+259>:  jmp    0x8048e6d <phase_3+371>
0x08048dff <+261>:  movb   $0x76,-0x11(%ebp)
0x08048e03 <+265>:  movzbl -0x12(%ebp),%eax
0x08048e07 <+269>:  movsbl %al,%eax
0x08048e0a <+272>:  lea    0x20(%eax),%edx
0x08048e0d <+275>:  movsbl -0x11(%ebp),%eax
0x08048e11 <+279>:  cmp    %eax,%edx
0x08048e13 <+281>:  je     0x8048e70 <phase_3+374>
---Type <return> to continue, or q <return> to quit---
0x08048e15 <+283>:  call   0x8049675 <explode_bomb>
0x08048e1a <+288>:  jmp    0x8048e70 <phase_3+374>
0x08048e1c <+290>:  movb   $0x70,-0x11(%ebp)
0x08048e20 <+294>:  movzbl -0x12(%ebp),%eax
0x08048e24 <+298>:  movsbl %al,%eax
0x08048e27 <+301>:  lea    0x20(%eax),%edx
0x08048e2a <+304>:  movsbl -0x11(%ebp),%eax
0x08048e2e <+308>:  cmp    %eax,%edx
0x08048e30 <+310>:  je     0x8048e73 <phase_3+377>
0x08048e32 <+312>:  call   0x8049675 <explode_bomb>
0x08048e37 <+317>:  jmp    0x8048e73 <phase_3+377>
0x08048e39 <+319>:  movb   $0x6f,-0x11(%ebp)
0x08048e3d <+323>:  movzbl -0x12(%ebp),%eax
0x08048e41 <+327>:  movsbl %al,%eax
0x08048e44 <+330>:  lea    0x20(%eax),%edx
0x08048e47 <+333>:  movsbl -0x11(%ebp),%eax
0x08048e4b <+337>:  cmp    %eax,%edx
0x08048e4d <+339>:  je     0x8048e76 <phase_3+380>
0x08048e4f <+341>:  call   0x8049675 <explode_bomb>
0x08048e54 <+346>:  jmp    0x8048e76 <phase_3+380>
0x08048e56 <+348>:  movb   $0x69,-0x11(%ebp)
0x08048e5a <+352>:  call   0x8049675 <explode_bomb>
0x08048e5f <+357>:  jmp    0x8048e77 <phase_3+381>
0x08048e61 <+359>:  nop
0x08048e62 <+360>:  jmp    0x8048e77 <phase_3+381>
0x08048e64 <+362>:  nop
0x08048e65 <+363>:  jmp    0x8048e77 <phase_3+381>
0x08048e67 <+365>:  nop
0x08048e68 <+366>:  jmp    0x8048e77 <phase_3+381>
0x08048e6a <+368>:  nop
0x08048e6b <+369>:  jmp    0x8048e77 <phase_3+381>
0x08048e6d <+371>:  nop
0x08048e6e <+372>:  jmp    0x8048e77 <phase_3+381>
0x08048e70 <+374>:  nop
0x08048e71 <+375>:  jmp    0x8048e77 <phase_3+381>
0x08048e73 <+377>:  nop
0x08048e74 <+378>:  jmp    0x8048e77 <phase_3+381>
0x08048e76 <+380>:  nop
0x08048d49 <+79>:   mov    0x804a808(,%eax,4),%eax

該語法表示:將0x804a808+4*%eax移至%eax 這應該可以幫助您確定下一行中的跳轉地址是什么。

暫無
暫無

聲明:本站的技術帖子網頁,遵循CC BY-SA 4.0協議,如果您需要轉載,請注明本站網址或者原文地址。任何問題請咨詢:yoyou2525@163.com.

 
粵ICP備18138465號  © 2020-2024 STACKOOM.COM