A binary bomb is a specific kind of disassembly puzzle. The "bomb" is a program which expects a certain series of answers to be typed in order to defuse it. Any mistake causes the bomb to "explode".
Questions tagged [binary-bomb]
26 questions
8
votes
2 answers
Difficulty understanding logic in disassembled binary bomb phase 3
I have the following assembly program from the binary-bomb lab. The goal is to determine the keyword needed to run the binary without triggering the explode_bomb function. I commented my analysis of the assembly for this program but I am having…

scy8
- 83
- 5
6
votes
1 answer
Binary Bomb - Phase 4
I am having a very difficult time tracing the assembly code for the following binary bomb (An assignment from school where a bomb has to be defused, this bomb contains 6 phases which all have 1 correct input to proceed to the next phase). I am…

petrov
- 1,085
- 3
- 12
- 13
4
votes
1 answer
Binary Bomb (Phase 4) %d %d
I have binary Phase that is not returning required result i.e 12. Any suggestions?
Phase 4
Dump of assembler code for function phase_4:
0x000000000040100b <+0>: sub $0x18,%rsp
0x000000000040100f <+4>: lea 0x8(%rsp),%rcx
…

R. Sandhu
- 41
- 2
- 4
2
votes
1 answer
how to defuse this binary bomb phase 4
I am having trouble this piece of code in assembly language.
Essentially I have to input 2 numbers that matches 2 numbers the code is comparing with.
On line 0x08048c47 in phase_4, it compares the first input with 2, so I know the first input has…

Henry Chen
- 55
- 1
- 8
2
votes
1 answer
Deciphering x86 assembly function
I am currently working on phase 2 of the binary bomb assignment. I'm having trouble deciphering exactly what a certain function does when called. I've been stuck on it for days.
The function is:
0000000000400f2a :
400f2a: 85 ff …

Kevin
- 23
- 2
1
vote
2 answers
Understanding Bomb Lab Phase 5 (two integer input)
I am currently stuck on bomb lab phase 5. My phase 5 is different from most other phase 5's I've found online, as it is the input of two integers. Here is the assembly code:
0x0000555555555536 <+0>: sub $0x18,%rsp
0x000055555555553a…

cinos
- 117
- 2
- 8
1
vote
0 answers
Matching user input to char array (Both contain DEL chars)
Im currently solving a binary bomb. Within there is a phase with the following code:
bool phase_bird(const char* guess)
{
char c;
c=blackBoxC();
appendChar(c);
mute(true);
c=blackBoxC();
appendChar(c);
c=blackBoxC();
…

mr leaf
- 23
- 6
1
vote
1 answer
Assembly - Binary Bomb
Having some trouble figuring what a specific segment in the binary bomb lab in x86 does.
0x08048ce8 <+0>: sub $0x1c,%esp
0x08048ceb <+3>: movl $0x804a4e4,(%esp)
0x08048cf2 <+10>: call 0x804917b
0x08048cf7 <+15>: add…

user5523001
- 11
- 3
0
votes
0 answers
Binary Bomb Lab Phase 6 : I was caught up in the last part
This is asm code for binary bomb Phase_6.
00000000004010ca :
4010ca: 41 56 push %r14
4010cc: 41 55 push %r13
4010ce: 41 54 push %r12
4010d0: 55 …
0
votes
0 answers
Bomb Lab Phase 6 :Stuck on the order of the answer
This is asm code for phase_6
Dump of assembler code for function phase_6:
=> 0x000055555555551b <+0>: push %r13
0x000055555555551d <+2>: push %r12
0x000055555555551f <+4>: push %rbp
0x0000555555555520 <+5>: push %rbx
…
0
votes
0 answers
reverse engineering assembly, finding addresses
is there any way that input values (integers in my case) effect the memory address of registers? I have a problem where I need two addresses to be equivalent, but I cannot figure out how my input influences the addresses, if at all. I am reverse…

jope
- 33
- 6
0
votes
2 answers
Binary Bomb Phase 5: What value would let the loop go through 15 times?
I am currently working on defusing a binary bomb and am stuck on phase 5. As far as I could figure out, there is a loop and the index (%edx) needs to be 15 to get through the loop. However, I am stuck at the array which always returns 15 after 6…
0
votes
1 answer
How to look at a series of values stored in memory
As part of a large project for a class I'm taking, I need to decipher large chunks of assembly. To judge that, I need to find the answers to different "phases" of a "bomb", via debugging that code. The goal is to not explode the bomb.
Dump of…

Josh
- 125
- 4
0
votes
0 answers
Binary Bomb Phase_2 (turning assembly into C)
So I'm working on my Binary bomb lab and i've gotten to the point where I used gdb to pull out this bit of assembly code. However I'm having trouble turning it into workable C code.
0x0000000000400dd0 <+0>: push %rbp
0x0000000000400dd1…

Timothy
- 1
- 1
0
votes
0 answers
Understanding how some assembly code is translated
Hi i'm currently doing a binary bomb and am wondering if I am understanding some stuff correctly. I have this;
0x00000000004011d4 <+0>: sub $0x8,%rsp
0x00000000004011d8 <+4>: cmpb $0x59,(%rdi)
0x00000000004011db <+7>: jne …

kreltin junior
- 11
- 1