-2

I am doing a lab for my cs class and we are reverse engineering a "binary bomb". I am confused on a few assembler instructions. If anyone could explain what these do and how the work I would greatly appreciate it.

lea   0x10(%rbx), %rbp. 

Im pretty sure rbx is supposed to hold the address of rbp, but im confused on the 0x10 argument.

mov   0x4(%rbx), %eax. 

Same thing as above, don't understand what the 0x4 argument is.

Steve Summit
  • 45,437
  • 7
  • 70
  • 103

1 Answers1

1

These are offsets (0x10 = 16bytes and 0x4=4bytes) to the pointers in rbp and eax. Most likely iterating over elements in an array/vector.

Gabriel
  • 106
  • 4