When run, it prompts the user to type in 6 different strings. If any of these is incorrect, the bomb "explodes," printing an error message and logging the event on a grading server. Students must "defuse" their own unique bomb by disassembling and reverse engineering the program to determine what the 6 strings should be.
0x08048e35 <+99>: mov $0x69,%eax
0x08048e3a <+104>: jmp 0x8048f0e <phase_3+316>
0x08048e3f <+109>: cmpl $0x1ce,-0x10(%ebp)
0x08048e46 <+116>: je 0x8048f09 <phase_3+311>
0x08048e4c <+122>: call 0x8049168 <explode_bomb>
0x08048e51 <+127>: mov $0x68,%eax
0x08048e56 <+132>: jmp 0x8048f0e <phase_3+316>
0x08048e5b <+137>: mov $0x72,%eax
0x08048e60 <+142>: cmpl $0xa9,-0x10(%ebp)
0x08048e67 <+149>: je 0x8048f0e <phase_3+316>
0x08048e6d <+155>: call 0x8049168 <explode_bomb>
0x08048e72 <+160>: mov $0x72,%eax
0x08048e77 <+165>: jmp 0x8048f0e <phase_3+316>
0x08048e7c <+170>: mov $0x62,%eax
0x08048e81 <+175>: cmpl $0xbb,-0x10(%ebp)
0x08048e88 <+182>: je 0x8048f0e <phase_3+316>
0x08048e8e <+188>: call 0x8049168 <explode_bomb>
0x08048e93 <+193>: mov $0x62,%eax
0x08048e98 <+198>: jmp 0x8048f0e <phase_3+316>
0x08048e9a <+200>: cmpl $0xe0,-0x10(%ebp)
0x08048ea1 <+207>: je 0x8048f09 <phase_3+311>
0x08048ea3 <+209>: call 0x8049168 <explode_bomb>
0x08048ea8 <+214>: mov $0x68,%eax
0x08048ead <+219>: jmp 0x8048f0e <phase_3+316>
0x08048eaf <+221>: mov $0x79,%eax
0x08048eb4 <+226>: cmpl $0x2e2,-0x10(%ebp)
0x08048ebb <+233>: je 0x8048f0e <phase_3+316>
0x08048ebd <+235>: call 0x8049168 <explode_bomb>
0x08048ec2 <+240>: mov $0x79,%eax
0x08048ec7 <+245>: jmp 0x8048f0e <phase_3+316>
0x08048ec9 <+247>: mov $0x6b,%eax
0x08048ece <+252>: cmpl $0x3ba,-0x10(%ebp)
0x08048ed5 <+259>: je 0x8048f0e <phase_3+316>
0x08048ed7 <+261>: call 0x8049168 <explode_bomb>
0x08048edc <+266>: mov $0x6b,%eax
0x08048ee1 <+271>: jmp 0x8048f0e <phase_3+316>
0x08048ee3 <+273>: mov $0x61,%eax
0x08048ee8 <+278>: cmpl $0x2a8,-0x10(%ebp)
0x08048eef <+285>: je 0x8048f0e <phase_3+316>
0x08048ef1 <+287>: call 0x8049168 <explode_bomb>
0x08048ef6 <+292>: mov $0x61,%eax
0x08048efb <+297>: jmp 0x8048f0e <phase_3+316>
0x08048efd <+299>: call 0x8049168 <explode_bomb>