Guest User

Untitled

a guest
Oct 19th, 2018
88
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.55 KB | None | 0 0
  1. 0x0000000000400f49 <+0>: push %rbp
  2. 0x0000000000400f4a <+1>: push %rbx
  3. 0x0000000000400f4b <+2>: sub $0x28,%rsp
  4. 0x0000000000400f4f <+6>: mov %fs:0x28,%rax
  5. 0x0000000000400f58 <+15>: mov %rax,0x18(%rsp)
  6. 0x0000000000400f5d <+20>: xor %eax,%eax
  7. 0x0000000000400f5f <+22>: mov %rsp,%rsi
  8. 0x0000000000400f62 <+25>: callq 0x4016c6 <read_six_numbers>
  9. 0x0000000000400f67 <+30>: cmpl $0x0,(%rsp)
  10. 0x0000000000400f6b <+34>: jns 0x400f72 <phase_2+41>
  11. 0x0000000000400f6d <+36>: callq 0x401690 <explode_bomb>
  12. 0x0000000000400f72 <+41>: mov %rsp,%rbp
  13. 0x0000000000400f75 <+44>: mov $0x1,%ebx
  14. 0x0000000000400f7a <+49>: mov %ebx,%eax
  15. 0x0000000000400f7c <+51>: add 0x0(%rbp),%eax
  16. 0x0000000000400f7f <+54>: cmp %eax,0x4(%rbp)
  17. 0x0000000000400f82 <+57>: je 0x400f89 <phase_2+64>
  18. 0x0000000000400f84 <+59>: callq 0x401690 <explode_bomb>
  19. 0x0000000000400f89 <+64>: add $0x1,%ebx
  20. 0x0000000000400f8c <+67>: add $0x4,%rbp
  21. 0x0000000000400f90 <+71>: cmp $0x6,%ebx
  22. 0x0000000000400f93 <+74>: jne 0x400f7a <phase_2+49>
  23. 0x0000000000400f95 <+76>: mov 0x18(%rsp),%rax
  24. 0x0000000000400f9a <+81>: xor %fs:0x28,%rax
  25. 0x0000000000400fa3 <+90>: je 0x400faa <phase_2+97>
  26. 0x0000000000400fa5 <+92>: callq 0x400b90 <__stack_chk_fail@plt>
  27. 0x0000000000400faa <+97>: add $0x28,%rsp
  28. 0x0000000000400fae <+101>: pop %rbx
  29. 0x0000000000400faf <+102>: pop %rbp
  30. 0x0000000000400fb0 <+103>: retq
Add Comment
Please, Sign In to add comment