Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 0x08048642 <+0>: push ebp
- 0x08048643 <+1>: mov ebp,esp
- 0x08048645 <+3>: sub esp,0x28
- 0x08048648 <+6>: call 0x80485db <read_input>
- 0x0804864d <+11>: mov DWORD PTR [ebp-0x14],eax
- 0x08048650 <+14>: sub esp,0xc
- 0x08048653 <+17>: push DWORD PTR [ebp-0x14]
- 0x08048656 <+20>: call 0x8048490 <strlen@plt>
- 0x0804865b <+25>: add esp,0x10
- 0x0804865e <+28>: mov DWORD PTR [ebp-0x10],eax
- 0x08048661 <+31>: mov eax,DWORD PTR [ebp-0x10]
- 0x08048664 <+34>: add eax,0x1
- 0x08048667 <+37>: sub esp,0xc
- 0x0804866a <+40>: push eax
- 0x0804866b <+41>: call 0x8048460 <malloc@plt>
- 0x08048670 <+46>: add esp,0x10
- 0x08048673 <+49>: mov DWORD PTR [ebp-0xc],eax
- 0x08048676 <+52>: cmp DWORD PTR [ebp-0xc],0x0
- 0x0804867a <+56>: jne 0x8048696 <do_magic+84>
- 0x0804867c <+58>: sub esp,0xc
- 0x0804867f <+61>: push 0x8048884
- 0x08048684 <+66>: call 0x8048470 <puts@plt>
- 0x08048689 <+71>: add esp,0x10
- 0x0804868c <+74>: sub esp,0xc
- 0x0804868f <+77>: push 0xffffffff
- 0x08048691 <+79>: call 0x8048480 <exit@plt>
- 0x08048696 <+84>: mov eax,DWORD PTR [ebp-0x10]
- 0x08048699 <+87>: add eax,0x1
- 0x0804869c <+90>: sub esp,0x4
- 0x0804869f <+93>: push eax
- 0x080486a0 <+94>: push 0x0
- 0x080486a2 <+96>: push DWORD PTR [ebp-0xc]
- 0x080486a5 <+99>: call 0x80484c0 <memset@plt>
- 0x080486aa <+104>: add esp,0x10
- 0x080486ad <+107>: mov DWORD PTR [ebp-0x1c],0x0
- 0x080486b4 <+114>: mov DWORD PTR [ebp-0x18],0x0
- 0x080486bb <+121>: jmp 0x804870b <do_magic+201>
- 0x080486bd <+123>: mov eax,DWORD PTR [ebp-0x18]
- 0x080486c0 <+126>: add eax,0x8048858
- 0x080486c5 <+131>: movzx ecx,BYTE PTR [eax]
- 0x080486c8 <+134>: mov edx,DWORD PTR [ebp-0x18]
- 0x080486cb <+137>: mov eax,DWORD PTR [ebp-0x14]
- 0x080486ce <+140>: add eax,edx
- 0x080486d0 <+142>: movzx eax,BYTE PTR [eax]
- 0x080486d3 <+145>: xor eax,ecx
- 0x080486d5 <+147>: mov BYTE PTR [ebp-0x1d],al
- 0x080486d8 <+150>: mov edx,DWORD PTR ds:0x804a038
- 0x080486de <+156>: mov eax,DWORD PTR [ebp-0x18]
- 0x080486e1 <+159>: add eax,edx
- 0x080486e3 <+161>: movzx eax,BYTE PTR [eax]
- 0x080486e6 <+164>: cmp al,BYTE PTR [ebp-0x1d]
- 0x080486e9 <+167>: jne 0x80486ef <do_magic+173>
- 0x080486eb <+169>: add DWORD PTR [ebp-0x1c],0x1
- 0x080486ef <+173>: cmp DWORD PTR [ebp-0x1c],0x19
- 0x080486f3 <+177>: jne 0x8048707 <do_magic+197>
- 0x080486f5 <+179>: sub esp,0xc
- 0x080486f8 <+182>: push 0x80488ab
- 0x080486fd <+187>: call 0x8048470 <puts@plt>
- 0x08048702 <+192>: add esp,0x10
- 0x08048705 <+195>: jmp 0x8048713 <do_magic+209>
- 0x08048707 <+197>: add DWORD PTR [ebp-0x18],0x1
- 0x0804870b <+201>: mov eax,DWORD PTR [ebp-0x18]
- 0x0804870e <+204>: cmp eax,DWORD PTR [ebp-0x10]
- 0x08048711 <+207>: jl 0x80486bd <do_magic+123>
- 0x08048713 <+209>: leave
- 0x08048714 <+210>: ret
- End of assembler dump.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement