Advertisement
Guest User

Untitled

a guest
Oct 19th, 2018
84
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.01 KB | None | 0 0
  1. 0x08048642 <+0>: push ebp
  2. 0x08048643 <+1>: mov ebp,esp
  3. 0x08048645 <+3>: sub esp,0x28
  4. 0x08048648 <+6>: call 0x80485db <read_input>
  5. 0x0804864d <+11>: mov DWORD PTR [ebp-0x14],eax
  6. 0x08048650 <+14>: sub esp,0xc
  7. 0x08048653 <+17>: push DWORD PTR [ebp-0x14]
  8. 0x08048656 <+20>: call 0x8048490 <strlen@plt>
  9. 0x0804865b <+25>: add esp,0x10
  10. 0x0804865e <+28>: mov DWORD PTR [ebp-0x10],eax
  11. 0x08048661 <+31>: mov eax,DWORD PTR [ebp-0x10]
  12. 0x08048664 <+34>: add eax,0x1
  13. 0x08048667 <+37>: sub esp,0xc
  14. 0x0804866a <+40>: push eax
  15. 0x0804866b <+41>: call 0x8048460 <malloc@plt>
  16. 0x08048670 <+46>: add esp,0x10
  17. 0x08048673 <+49>: mov DWORD PTR [ebp-0xc],eax
  18. 0x08048676 <+52>: cmp DWORD PTR [ebp-0xc],0x0
  19. 0x0804867a <+56>: jne 0x8048696 <do_magic+84>
  20. 0x0804867c <+58>: sub esp,0xc
  21. 0x0804867f <+61>: push 0x8048884
  22. 0x08048684 <+66>: call 0x8048470 <puts@plt>
  23. 0x08048689 <+71>: add esp,0x10
  24. 0x0804868c <+74>: sub esp,0xc
  25. 0x0804868f <+77>: push 0xffffffff
  26. 0x08048691 <+79>: call 0x8048480 <exit@plt>
  27. 0x08048696 <+84>: mov eax,DWORD PTR [ebp-0x10]
  28. 0x08048699 <+87>: add eax,0x1
  29. 0x0804869c <+90>: sub esp,0x4
  30. 0x0804869f <+93>: push eax
  31. 0x080486a0 <+94>: push 0x0
  32. 0x080486a2 <+96>: push DWORD PTR [ebp-0xc]
  33. 0x080486a5 <+99>: call 0x80484c0 <memset@plt>
  34. 0x080486aa <+104>: add esp,0x10
  35. 0x080486ad <+107>: mov DWORD PTR [ebp-0x1c],0x0
  36. 0x080486b4 <+114>: mov DWORD PTR [ebp-0x18],0x0
  37. 0x080486bb <+121>: jmp 0x804870b <do_magic+201>
  38. 0x080486bd <+123>: mov eax,DWORD PTR [ebp-0x18]
  39. 0x080486c0 <+126>: add eax,0x8048858
  40. 0x080486c5 <+131>: movzx ecx,BYTE PTR [eax]
  41. 0x080486c8 <+134>: mov edx,DWORD PTR [ebp-0x18]
  42. 0x080486cb <+137>: mov eax,DWORD PTR [ebp-0x14]
  43. 0x080486ce <+140>: add eax,edx
  44. 0x080486d0 <+142>: movzx eax,BYTE PTR [eax]
  45. 0x080486d3 <+145>: xor eax,ecx
  46. 0x080486d5 <+147>: mov BYTE PTR [ebp-0x1d],al
  47. 0x080486d8 <+150>: mov edx,DWORD PTR ds:0x804a038
  48. 0x080486de <+156>: mov eax,DWORD PTR [ebp-0x18]
  49. 0x080486e1 <+159>: add eax,edx
  50. 0x080486e3 <+161>: movzx eax,BYTE PTR [eax]
  51. 0x080486e6 <+164>: cmp al,BYTE PTR [ebp-0x1d]
  52. 0x080486e9 <+167>: jne 0x80486ef <do_magic+173>
  53. 0x080486eb <+169>: add DWORD PTR [ebp-0x1c],0x1
  54. 0x080486ef <+173>: cmp DWORD PTR [ebp-0x1c],0x19
  55. 0x080486f3 <+177>: jne 0x8048707 <do_magic+197>
  56. 0x080486f5 <+179>: sub esp,0xc
  57. 0x080486f8 <+182>: push 0x80488ab
  58. 0x080486fd <+187>: call 0x8048470 <puts@plt>
  59. 0x08048702 <+192>: add esp,0x10
  60. 0x08048705 <+195>: jmp 0x8048713 <do_magic+209>
  61. 0x08048707 <+197>: add DWORD PTR [ebp-0x18],0x1
  62. 0x0804870b <+201>: mov eax,DWORD PTR [ebp-0x18]
  63. 0x0804870e <+204>: cmp eax,DWORD PTR [ebp-0x10]
  64. 0x08048711 <+207>: jl 0x80486bd <do_magic+123>
  65. 0x08048713 <+209>: leave
  66. 0x08048714 <+210>: ret
  67. End of assembler dump.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement