Binary-Bomb | Binary Bomb / Bomb Lab/ Assembly Bomb/ Dr Evil 's Binary Bomb | Hacking library
kandi X-RAY | Binary-Bomb Summary
kandi X-RAY | Binary-Bomb Summary
Binary Bomb / Bomb Lab/ Assembly Bomb/ Dr Evil's Binary Bomb
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Binary-Bomb
Binary-Bomb Key Features
Binary-Bomb Examples and Code Snippets
Community Discussions
Trending Discussions on Binary-Bomb
QUESTION
I have the following assembly program from the binary-bomb lab. The goal is to determine the keyword needed to run the binary without triggering the explode_bomb
function. I commented my analysis of the assembly for this program but I am having trouble piecing everything together.
I believe I have all the information I need, but I still am unable to see the actual underlying logic and thus I am stuck. I would greatly appreciate any help!
The following is the disassembled program itself:
...ANSWER
Answered 2020-Apr-07 at 02:28rep movsl
copies 32-bit longwords from address %esi
to address %edi
, incrementing both by 4 each time, a number of times equal to %ecx
. Think of it as memcpy(edi, esi, ecx*4)
.
See https://felixcloutier.com/x86/movs:movsb:movsw:movsd:movsq (it's movsd in Intel notation).
So this is copying 19*4=76
bytes.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install Binary-Bomb
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page