Advertisement
Guest User

Untitled

a guest
Jul 26th, 2017
61
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.36 KB | None | 0 0
  1. 0x08048f91 <+0>: push %ebp
  2. 0x08048f92 <+1>: mov %esp,%ebp
  3. 0x08048f94 <+3>: sub $0x28,%esp
  4. => 0x08048f97 <+6>: lea -0x10(%ebp),%eax
  5. 0x08048f9a <+9>: mov %eax,0xc(%esp)
  6. 0x08048f9e <+13>: lea -0xc(%ebp),%eax
  7. 0x08048fa1 <+16>: mov %eax,0x8(%esp)
  8. 0x08048fa5 <+20>: movl $0x804a56c,0x4(%esp)
  9. 0x08048fad <+28>: mov 0x8(%ebp),%eax
  10. 0x08048fb0 <+31>: mov %eax,(%esp)
  11. 0x08048fb3 <+34>: call 0x8048894 <__isoc99_sscanf@plt>
  12. 0x08048fb8 <+39>: cmp $0x1,%eax
  13. 0x08048fbb <+42>: jg 0x8048fc2 <phase_3+49>
  14. 0x08048fbd <+44>: call 0x8049321 <explode_bomb>
  15. 0x08048fc2 <+49>: cmpl $0x7,-0xc(%ebp)
  16. 0x08048fc6 <+53>: ja 0x8049033 <phase_3+162>
  17. 0x08048fc8 <+55>: mov -0xc(%ebp),%eax
  18. 0x08048fcb <+58>: jmp *0x804a4a0(,%eax,4)
  19. 0x08048fd2 <+65>: mov $0x0,%eax
  20. 0x08048fd7 <+70>: jmp 0x804902c <phase_3+155>
  21. 0x08048fd9 <+72>: mov $0x0,%eax
  22. 0x08048fde <+77>: xchg %ax,%ax
  23. 0x08048fe0 <+79>: jmp 0x8049027 <phase_3+150>
  24. 0x08048fe2 <+81>: mov $0x0,%eax
  25. 0x08048fe7 <+86>: jmp 0x8049022 <phase_3+145>
  26. 0x08048fe9 <+88>: mov $0x0,%eax
  27. 0x08048fee <+93>: xchg %ax,%ax
  28. 0x08048ff0 <+95>: jmp 0x804901d <phase_3+140>
  29. 0x08048ff2 <+97>: mov $0x0,%eax
  30. 0x08048ff7 <+102>: jmp 0x8049018 <phase_3+135>
  31. 0x08048ff9 <+104>: mov $0x0,%eax
  32. 0x08048ffe <+109>: xchg %ax,%ax
  33. 0x08049000 <+111>: jmp 0x8049013 <phase_3+130>
  34. 0x08049002 <+113>: mov $0x28b,%eax
  35. 0x08049007 <+118>: jmp 0x804900e <phase_3+125>
  36. 0x08049009 <+120>: mov $0x0,%eax
  37. 0x0804900e <+125>: sub $0xcc,%eax
  38. 0x08049013 <+130>: add $0x1fd,%eax
  39. 0x08049018 <+135>: sub $0x1fb,%eax
  40. 0x0804901d <+140>: add $0x1fb,%eax
  41. 0x08049022 <+145>: sub $0x1fb,%eax
  42. 0x08049027 <+150>: add $0x1fb,%eax
  43. 0x0804902c <+155>: sub $0x1fb,%eax
  44. 0x08049031 <+160>: jmp 0x804903d <phase_3+172>
  45. 0x08049033 <+162>: call 0x8049321 <explode_bomb>
  46. 0x08049038 <+167>: mov $0x0,%eax
  47. 0x0804903d <+172>: cmpl $0x5,-0xc(%ebp)
  48. 0x08049041 <+176>: jg 0x8049048 <phase_3+183>
  49. 0x08049043 <+178>: cmp -0x10(%ebp),%eax
  50. 0x08049046 <+181>: je 0x804904d <phase_3+188>
  51. 0x08049048 <+183>: call 0x8049321 <explode_bomb>
  52. 0x0804904d <+188>: leave
  53. 0x0804904e <+189>: xchg %ax,%ax
  54. 0x08049050 <+191>: ret
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement