Questions tagged [binary-bomb]

A binary bomb is a specific kind of disassembly puzzle. The "bomb" is a program which expects a certain series of answers to be typed in order to defuse it. Any mistake causes the bomb to "explode".

26 questions
8
votes
2 answers

Difficulty understanding logic in disassembled binary bomb phase 3

I have the following assembly program from the binary-bomb lab. The goal is to determine the keyword needed to run the binary without triggering the explode_bomb function. I commented my analysis of the assembly for this program but I am having…
scy8
  • 83
  • 5
6
votes
1 answer

Binary Bomb - Phase 4

I am having a very difficult time tracing the assembly code for the following binary bomb (An assignment from school where a bomb has to be defused, this bomb contains 6 phases which all have 1 correct input to proceed to the next phase). I am…
petrov
  • 1,085
  • 3
  • 12
  • 13
4
votes
1 answer

Binary Bomb (Phase 4) %d %d

I have binary Phase that is not returning required result i.e 12. Any suggestions? Phase 4 Dump of assembler code for function phase_4: 0x000000000040100b <+0>: sub $0x18,%rsp 0x000000000040100f <+4>: lea 0x8(%rsp),%rcx …
R. Sandhu
  • 41
  • 2
  • 4
2
votes
1 answer

how to defuse this binary bomb phase 4

I am having trouble this piece of code in assembly language. Essentially I have to input 2 numbers that matches 2 numbers the code is comparing with. On line 0x08048c47 in phase_4, it compares the first input with 2, so I know the first input has…
Henry Chen
  • 55
  • 1
  • 8
2
votes
1 answer

Deciphering x86 assembly function

I am currently working on phase 2 of the binary bomb assignment. I'm having trouble deciphering exactly what a certain function does when called. I've been stuck on it for days. The function is: 0000000000400f2a : 400f2a: 85 ff …
Kevin
  • 23
  • 2
1
vote
2 answers

Understanding Bomb Lab Phase 5 (two integer input)

I am currently stuck on bomb lab phase 5. My phase 5 is different from most other phase 5's I've found online, as it is the input of two integers. Here is the assembly code: 0x0000555555555536 <+0>: sub $0x18,%rsp 0x000055555555553a…
cinos
  • 117
  • 2
  • 8
1
vote
0 answers

Matching user input to char array (Both contain DEL chars)

Im currently solving a binary bomb. Within there is a phase with the following code: bool phase_bird(const char* guess) { char c; c=blackBoxC(); appendChar(c); mute(true); c=blackBoxC(); appendChar(c); c=blackBoxC(); …
mr leaf
  • 23
  • 6
1
vote
1 answer

Assembly - Binary Bomb

Having some trouble figuring what a specific segment in the binary bomb lab in x86 does. 0x08048ce8 <+0>: sub $0x1c,%esp 0x08048ceb <+3>: movl $0x804a4e4,(%esp) 0x08048cf2 <+10>: call 0x804917b 0x08048cf7 <+15>: add…
0
votes
0 answers

Binary Bomb Lab Phase 6 : I was caught up in the last part

This is asm code for binary bomb Phase_6. 00000000004010ca : 4010ca: 41 56 push %r14 4010cc: 41 55 push %r13 4010ce: 41 54 push %r12 4010d0: 55 …
0
votes
0 answers

Bomb Lab Phase 6 :Stuck on the order of the answer

This is asm code for phase_6 Dump of assembler code for function phase_6: => 0x000055555555551b <+0>: push %r13 0x000055555555551d <+2>: push %r12 0x000055555555551f <+4>: push %rbp 0x0000555555555520 <+5>: push %rbx …
0
votes
0 answers

reverse engineering assembly, finding addresses

is there any way that input values (integers in my case) effect the memory address of registers? I have a problem where I need two addresses to be equivalent, but I cannot figure out how my input influences the addresses, if at all. I am reverse…
jope
  • 33
  • 6
0
votes
2 answers

Binary Bomb Phase 5: What value would let the loop go through 15 times?

I am currently working on defusing a binary bomb and am stuck on phase 5. As far as I could figure out, there is a loop and the index (%edx) needs to be 15 to get through the loop. However, I am stuck at the array which always returns 15 after 6…
0
votes
1 answer

How to look at a series of values stored in memory

As part of a large project for a class I'm taking, I need to decipher large chunks of assembly. To judge that, I need to find the answers to different "phases" of a "bomb", via debugging that code. The goal is to not explode the bomb. Dump of…
Josh
  • 125
  • 4
0
votes
0 answers

Binary Bomb Phase_2 (turning assembly into C)

So I'm working on my Binary bomb lab and i've gotten to the point where I used gdb to pull out this bit of assembly code. However I'm having trouble turning it into workable C code. 0x0000000000400dd0 <+0>: push %rbp 0x0000000000400dd1…
0
votes
0 answers

Understanding how some assembly code is translated

Hi i'm currently doing a binary bomb and am wondering if I am understanding some stuff correctly. I have this; 0x00000000004011d4 <+0>: sub $0x8,%rsp 0x00000000004011d8 <+4>: cmpb $0x59,(%rdi) 0x00000000004011db <+7>: jne …
1
2