CSAPP:bomblab

做完了bomblab,想要写一下详解来复习汇编~
ICS加油冲冲冲!!!


先来一发通关截图!
在这里插入图片描述

phase 1

来康康这最短的一关hhh
先要研究调用的< string_not_equal>(真的不能看名字猜吗…)
它调用了< string_length>,来康康

000000000040131b <string_length>:
  40131b:	80 3f 00             	cmpb   $0x0,(%rdi)//字符串 in rdi,判断是否空串(第一个字符是否\0)
  40131e:	74 12                	je     401332 <string_length+0x17>//空串,输出长度0,结束
  401332:	b8 00 00 00 00       	mov    $0x0,%eax//非空串,length==0

  401320:	48 89 fa             	mov    %rdi,%rdx//rdi是string首字符
loop:
  401323:	48 83 c2 01          	add    $0x1,%rdx//rdx退后一个字符
  401327:	89 d0                	mov    %edx,%eax
  401329:	29 f8                	sub    %edi,%eax//eax即为string长度(rdx-rdi,当前字符-首字符)
  40132b:	80 3a 00             	cmpb   $0x0,(%rdx)//rdx是否退到\0
  40132e:	75 f3                	jne    401323 <string_length+0x8>//字符串未结束,循环loop

  401330:	f3 c3                	repz retq 
  401332:	b8 00 00 00 00       	mov    $0x0,%eax//eax is the length
  401337:	c3                   	retq   
  

返回的就是字符串长度啦~

0000000000401338 <strings_not_equal>:
  401338:	41 54                	push   %r12
  40133a:	55                   	push   %rbp
  40133b:	53                   	push   %rbx
  40133c:	48 89 fb             	mov    %rdi,%rbx//字符串
  40133f:	48 89 f5             	mov    %rsi,%rbp//输入串
  401342:	e8 d4 ff ff ff       	callq  40131b <string_length>
  401347:	41 89 c4             	mov    %eax,%r12d
  40134a:	48 89 ef             	mov    %rbp,%rdi
  40134d:	e8 c9 ff ff ff       	callq  40131b <string_length>//分别求两个字符串长度,字符串in r12d,输入串in eax
  401352:	ba 01 00 00 00       	mov    $0x1,%edx
  401357:	41 39 c4             	cmp    %eax,%r12d
  40135a:	75 3f                	jne    40139b <strings_not_equal+0x63>//长度不等,输出1,结束
  
//长度相等
  40135c:	0f b6 03             	movzbl (%rbx),%eax
  40135f:	84 c0                	test   %al,%al//是否空串
  401361:	74 25                	je     401388 <strings_not_equal+0x50>//都是空串,输出0,结束
  
//都不是空串
  401363:	3a 45 00             	cmp    0x0(%rbp),%al
  401366:	74 0a                	je     401372 <strings_not_equal+0x3a>//比较字符
  401368:	eb 25                	jmp    40138f <strings_not_equal+0x57>
loop:
  40136a:	3a 45 00             	cmp    0x0(%rbp),%al//比较字符
  40136d:	0f 1f 00             	nopl   (%rax)
  401370:	75 24                	jne    401396 <strings_not_equal+0x5e>//出现不等
  401372:	48 83 c3 01          	add    $0x1,%rbx
  401376:	48 83 c5 01          	add    $0x1,%rbp//若比较得字符相等,都后退一个字符
  40137a:	0f b6 03             	movzbl (%rbx),%eax
  40137d:	84 c0                	test   %al,%al//是否到末尾
  40137f:	75 e9                	jne    40136a <strings_not_equal+0x32>//未到末尾,循环loop比较

  401381:	ba 00 00 00 00       	mov    $0x0,%edx//全都相等,返回0,结束
  401386:	eb 13                	jmp    40139b <strings_not_equal+0x63>

  401388:	ba 00 00 00 00       	mov    $0x0,%edx
  40138d:	eb 0c                	jmp    40139b <strings_not_equal+0x63>
  40138f:	ba 01 00 00 00       	mov    $0x1,%edx
  401394:	eb 05                	jmp    40139b <strings_not_equal+0x63>
  401396:	ba 01 00 00 00       	mov    $0x1,%edx
  40139b:	89 d0                	mov    %edx,%eax
  40139d:	5b                   	pop    %rbx
  40139e:	5d                   	pop    %rbp
  40139f:	41 5c                	pop    %r12
  4013a1:	c3                   	retq 
  

所以这个函数就是判断输入字符串是否与内置字符串相等滴

0000000000400ee0 <phase_1>:
  400ee0:	48 83 ec 08          	sub    $0x8,%rsp
  400ee4:	be 00 24 40 00       	mov    $0x402400,%esi
  400ee9:	e8 4a 04 00 00       	callq  401338 <strings_not_equal>
  400eee:	85 c0                	test   %eax,%eax
  400ef0:	74 05                	je     400ef7 <phase_1+0x17>//字符串不相等就炸了哦
  400ef2:	e8 43 05 00 00       	callq  40143a <explode_bomb>
  400ef7:	48 83 c4 08          	add    $0x8,%rsp
  400efb:	c3                   	retq   


所以就这么简单,x/s 0x402400 查看字符串,输入一摸一样的使< string_not_equal>返回0就好啦!

答案:Border relations with Canada have never been better.


(写完跨网传输方案了~开心!!)

Phase 2

先看调用的< read_six_numbers>,就是读入6个及以上数字啦

000000000040145c <read_six_numbers>:
  40145c:	48 83 ec 18          	sub    $0x18,%rsp
  401460:	48 89 f2             	mov    %rsi,%rdx
  401463:	48 8d 4e 04          	lea    0x4(%rsi),%rcx
  401467:	48 8d 46 14          	lea    0x14(%rsi),%rax
  40146b:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
  401470:	48 8d 46 10          	lea    0x10(%rsi),%rax
  401474:	48 89 04 24          	mov    %rax,(%rsp)
  401478:	4c 8d 4e 0c          	lea    0xc(%rsi),%r9
  40147c:	4c 8d 46 08          	lea    0x8(%rsi),%r8
  401480:	be c3 25 40 00       	mov    $0x4025c3,%esi
  401485:	b8 00 00 00 00       	mov    $0x0,%eax//记录读入个数
  40148a:	e8 61 f7 ff ff       	callq  400bf0 <__isoc99_sscanf@plt>
  40148f:	83 f8 05             	cmp    $0x5,%eax
//读入数字要>5
  401492:	7f 05                	jg     401499 <read_six_numbers+0x3d>
  401494:	e8 a1 ff ff ff       	callq  40143a <explode_bomb>
  401499:	48 83 c4 18          	add    $0x18,%rsp
  40149d:	c3                   	retq   

然后是第二关代码

0000000000400efc <phase_2>:
  400efc:	55                   	push   %rbp
  400efd:	53                   	push   %rbx
  400efe:	48 83 ec 28          	sub    $0x28,%rsp
  400f02:	48 89 e6             	mov    %rsp,%rsi
  400f05:	e8 52 05 00 00       	callq  40145c <read_six_numbers>//读入六个数
  400f0a:	83 3c 24 01          	cmpl   $0x1,(%rsp)//第一个数是否为1
  400f0e:	74 20                	je     400f30 <phase_2+0x34>//第一个数字一定要==1
  400f10:	e8 25 05 00 00       	callq  40143a <explode_bomb>
  400f15:	eb 19                	jmp    400f30 <phase_2+0x34>
loop:
  400f17:	8b 43 fc             	mov    -0x4(%rbx),%eax//eax时rbx之前的那个数
  400f1a:	01 c0                	add    %eax,%eax//eax*2
  400f1c:	39 03                	cmp    %eax,(%rbx)//rbx=eax*2
  400f1e:	74 05                	je     400f25 <phase_2+0x29>
  400f20:	e8 15 05 00 00       	callq  40143a <explode_bomb>

  400f25:	48 83 c3 04          	add    $0x4,%rbx//若后一个等于前一个的两倍,后移
  400f29:	48 39 eb             	cmp    %rbp,%rbx//rbp用于判断到达末尾
  400f2c:	75 e9                	jne    400f17 <phase_2+0x1b>
  400f2e:	eb 0c                	jmp    400f3c <phase_2+0x40>//比较完

  400f30:	48 8d 5c 24 04       	lea    0x4(%rsp),%rbx//rbx是第二个数
  400f35:	48 8d 6c 24 18       	lea    0x18(%rsp),%rbp//注意0x18是24 第七个数
  400f3a:	eb db                	jmp    400f17 <phase_2+0x1b>

  400f3c:	48 83 c4 28          	add    $0x28,%rsp
  400f40:	5b                   	pop    %rbx
  400f41:	5d                   	pop    %rbp
  400f42:	c3                   	retq   
  

OK所以是输入六个及以上的数字,第一个数是1,之后每个数都是前一个数的两倍
答案:1 2 4 8 16 32


Phase 3
0000000000400f43 <phase_3>:
  400f43:	48 83 ec 18          	sub    $0x18,%rsp
  400f47:	48 8d 4c 24 0c       	lea    0xc(%rsp),%rcx//-6
  400f4c:	48 8d 54 24 08       	lea    0x8(%rsp),%rdx//-10
  400f51:	be cf 25 40 00       	mov    $0x4025cf,%esi
  400f56:	b8 00 00 00 00       	mov    $0x0,%eax
  400f5b:	e8 90 fc ff ff       	callq  400bf0 <__isoc99_sscanf@plt>
  400f60:	83 f8 01             	cmp    $0x1,%eax//输入的数字要多于1个
  400f63:	7f 05                	jg     400f6a <phase_3+0x27>//eax>=1
  400f65:	e8 d0 04 00 00       	callq  40143a <explode_bomb>
  400f6a:	83 7c 24 08 07       	cmpl   $0x7,0x8(%rsp)//rsp+8<=7&&>=0(ja)
  400f6f:	77 3c                	ja     400fad <phase_3+0x6a>

  400f71:	8b 44 24 08          	mov    0x8(%rsp),%eax//rsp+8
  400f75:	ff 24 c5 70 24 40 00 	jmpq   *0x402470(,%rax,8)//跳转表
(gdb测试出跳转表首地址)
  400f7c:	b8 cf 00 00 00       	mov    $0xcf,%eax//0
  400f81:	eb 3b                	jmp    400fbe <phase_3+0x7b>
  400f83:	b8 c3 02 00 00       	mov    $0x2c3,%eax//2
  400f88:	eb 34                	jmp    400fbe <phase_3+0x7b>
  400f8a:	b8 00 01 00 00       	mov    $0x100,%eax//3
  400f8f:	eb 2d                	jmp    400fbe <phase_3+0x7b>
  400f91:	b8 85 01 00 00       	mov    $0x185,%eax//4
  400f96:	eb 26                	jmp    400fbe <phase_3+0x7b>
  400f98:	b8 ce 00 00 00       	mov    $0xce,%eax//5
  400f9d:	eb 1f                	jmp    400fbe <phase_3+0x7b>
  400f9f:	b8 aa 02 00 00       	mov    $0x2aa,%eax//6
  400fa4:	eb 18                	jmp    400fbe <phase_3+0x7b>
  400fa6:	b8 47 01 00 00       	mov    $0x147,%eax//7
  400fab:	eb 11                	jmp    400fbe <phase_3+0x7b>

  400fad:	e8 88 04 00 00       	callq  40143a <explode_bomb>
  400fb2:	b8 00 00 00 00       	mov    $0x0,%eax
  400fb7:	eb 05                	jmp    400fbe <phase_3+0x7b>
  400fb9:	b8 37 01 00 00       	mov    $0x137,%eax//1

  400fbe:	3b 44 24 0c          	cmp    0xc(%rsp),%eax//
  400fc2:	74 05                	je     400fc9 <phase_3+0x86>

  400fc4:	e8 71 04 00 00       	callq  40143a <explode_bomb>
  400fc9:	48 83 c4 18          	add    $0x18,%rsp
  400fcd:	c3                   	retq   
  

大致可以看出是根据输入的第一个数(这个数必须在0-7之间)进行跳转操作(400f75)
然后是很明显的switch语句,根据gdb找到对应的情况:
在这里插入图片描述
我也不知道为什么要测到13???7就够了…
好啦跳转好之后就是修改eax的值(注意都是16进制!!第一次被坑了…)
然后比较eax里的值是不是你输入的第二个数,是的话就OK啦~
答案(不唯一):1 311


Phase 4

先看发挥重要作用的func 4

0000000000400fce <func4>:
  400fce:	48 83 ec 08          	sub    $0x8,%rsp
  400fd2:	89 d0                	mov    %edx,%eax//eax==14(以及esi==0 在phase 4 里可以分析出来)
  400fd4:	29 f0                	sub    %esi,%eax//eax==14
  400fd6:	89 c1                	mov    %eax,%ecx//ecx==14
  400fd8:	c1 e9 1f             	shr    $0x1f,%ecx//(>>31)ecx==0
  400fdb:	01 c8                	add    %ecx,%eax//eax==14
  400fdd:	d1 f8                	sar    %eax//(>>1)eax==7
  400fdf:	8d 0c 30             	lea    (%rax,%rsi,1),%ecx//ecx==7(一系列的运算)

  400fe2:	39 f9                	cmp    %edi,%ecx
  400fe4:	7e 0c                	jle    400ff2 <func4+0x24>//ecx<=edi跳出循环
  400fe6:	8d 51 ff             	lea    -0x1(%rcx),%edx//>
  400fe9:	e8 e0 ff ff ff       	callq  400fce <func4>

  400fee:	01 c0                	add    %eax,%eax
  400ff0:	eb 15                	jmp    401007 <func4+0x39>
  400ff2:	b8 00 00 00 00       	mov    $0x0,%eax//eax==0
  400ff7:	39 f9                	cmp    %edi,%ecx
  400ff9:	7d 0c                	jge    401007 <func4+0x39>//edi==ecx==7

  400ffb:	8d 71 01             	lea    0x1(%rcx),%esi//esi==1//不能edi==ecx 否则返回0(ecx<edi)
  400ffe:	e8 cb ff ff ff       	callq  400fce <func4>
  401003:	8d 44 00 01          	lea    0x1(%rax,%rax,1),%eax
  401007:	48 83 c4 08          	add    $0x8,%rsp
  40100b:	c3                   	retq   
  

再看phase 4,可以发现401029要求输入2个数字,输入的第一个数字<=14,edx14,esi0传入func 4,要求返回值为0

000000000040100c <phase_4>://7 0
  40100c:	48 83 ec 18          	sub    $0x18,%rsp
  401010:	48 8d 4c 24 0c       	lea    0xc(%rsp),%rcx
  401015:	48 8d 54 24 08       	lea    0x8(%rsp),%rdx
  40101a:	be cf 25 40 00       	mov    $0x4025cf,%esi
  40101f:	b8 00 00 00 00       	mov    $0x0,%eax
  401024:	e8 c7 fb ff ff       	callq  400bf0 <__isoc99_sscanf@plt>
  401029:	83 f8 02             	cmp    $0x2,%eax//eax==2
  40102c:	75 07                	jne    401035 <phase_4+0x29>

  40102e:	83 7c 24 08 0e       	cmpl   $0xe,0x8(%rsp)
  401033:	76 05                	jbe    40103a <phase_4+0x2e>//rsp+8(第一个数)<=14
  401035:	e8 00 04 00 00       	callq  40143a <explode_bomb>

  40103a:	ba 0e 00 00 00       	mov    $0xe,%edx//edx==14
  40103f:	be 00 00 00 00       	mov    $0x0,%esi//esi==0
  401044:	8b 7c 24 08          	mov    0x8(%rsp),%edi
  401048:	e8 81 ff ff ff       	callq  400fce <func4>

  40104d:	85 c0                	test   %eax,%eax//传回参数==0
  40104f:	75 07                	jne    401058 <phase_4+0x4c>

  401051:	83 7c 24 0c 00       	cmpl   $0x0,0xc(%rsp)//rsp+12==0
  401056:	74 05                	je     40105d <phase_4+0x51>
  401058:	e8 dd 03 00 00       	callq  40143a <explode_bomb>
  40105d:	48 83 c4 18          	add    $0x18,%rsp
  401061:	c3                   	retq   


再看到401056,要求输入的第二个数==0
所以只要输入符合func4输出为0的第一个数就可以啦
答案:7 0


Phase 5
0000000000401062 <phase_5>:
  401062:	53                   	push   %rbx
  401063:	48 83 ec 20          	sub    $0x20,%rsp
  401067:	48 89 fb             	mov    %rdi,%rbx
  40106a:	64 48 8b 04 25 28 00 	mov    %fs:0x28,%rax//把%fs偏移量为0x28的值存在%rax
  401071:	00 00 
  401073:	48 89 44 24 18       	mov    %rax,0x18(%rsp)
  401078:	31 c0                	xor    %eax,%eax//eax==0
  40107a:	e8 9c 02 00 00       	callq  40131b <string_length>
  40107f:	83 f8 06             	cmp    $0x6,%eax//string 长度==6

  401082:	74 4e                	je     4010d2 <phase_5+0x70>
  401084:	e8 b1 03 00 00       	callq  40143a <explode_bomb>
  401089:	eb 47                	jmp    4010d2 <phase_5+0x70>
  
loop:
  40108b:	0f b6 0c 03          	movzbl (%rbx,%rax,1),%ecx//
  40108f:	88 0c 24             	mov    %cl,(%rsp)//最后8位
  401092:	48 8b 14 24          	mov    (%rsp),%rdx
  401096:	83 e2 0f             	and    $0xf,%edx//最后4位
  401099:	0f b6 92 b0 24 40 00 	movzbl 0x4024b0(%rdx),%edx//跳转
  4010a0:	88 54 04 10          	mov    %dl,0x10(%rsp,%rax,1)
  4010a4:	48 83 c0 01          	add    $0x1,%rax//rax==1(相当于后移)
  4010a8:	48 83 f8 06          	cmp    $0x6,%rax
  4010ac:	75 dd                	jne    40108b <phase_5+0x29>//共操作6次

  4010ae:	c6 44 24 16 00       	movb   $0x0,0x16(%rsp)
  4010b3:	be 5e 24 40 00       	mov    $0x40245e,%esi
  4010b8:	48 8d 7c 24 10       	lea    0x10(%rsp),%rdi
  4010bd:	e8 76 02 00 00       	callq  401338 <strings_not_equal>
  4010c2:	85 c0                	test   %eax,%eax
  4010c4:	74 13                	je     4010d9 <phase_5+0x77>//string需相等
  4010c6:	e8 6f 03 00 00       	callq  40143a <explode_bomb>
  4010cb:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
  4010d0:	eb 07                	jmp    4010d9 <phase_5+0x77>

  4010d2:	b8 00 00 00 00       	mov    $0x0,%eax//eax==0
  4010d7:	eb b2                	jmp    40108b <phase_5+0x29>

  4010d9:	48 8b 44 24 18       	mov    0x18(%rsp),%rax
  4010de:	64 48 33 04 25 28 00 	xor    %fs:0x28,%rax//rax值是否被修改
  4010e5:	00 00 
  4010e7:	74 05                	je     4010ee <phase_5+0x8c>//rax==0
  4010e9:	e8 42 fa ff ff       	callq  400b30 <__stack_chk_fail@plt>
  4010ee:	48 83 c4 20          	add    $0x20,%rsp
  4010f2:	5b                   	pop    %rbx
  4010f3:	c3                   	retq   
  

有两个地址看起来就很重要,真的不测试一下吗
在这里插入图片描述
发现了两个奇奇怪怪的字符串
再仔细看上面第一个loop部分,会发现它依次把rsp字符的最后4位截取并以此为根据在第一个字符串中跳转,一共操作6次
然后需要操作后的字符串与第二个字符串相等
所以抽取出这个数字序列:9,f,e,5,6,7
我们输入长度为6的字符串,每个字符的最后四个bits对应这个序列即可
查看ASCii码找数字叭~
答案(不唯一):ionuvw


喔写完了二叉树作业,还看了电影,开心!!😆
争取今天写完BOMBLAB~

Phase 6
00000000004010f4 <phase_6>:

  4010f4:	41 56                	push   %r14
  4010f6:	41 55                	push   %r13
  4010f8:	41 54                	push   %r12
  4010fa:	55                   	push   %rbp
  4010fb:	53                   	push   %rbx
  4010fc:	48 83 ec 50          	sub    $0x50,%rsp
  401100:	49 89 e5             	mov    %rsp,%r13//rsp>6
  401103:	48 89 e6             	mov    %rsp,%rsi
  401106:	e8 51 03 00 00       	callq  40145c <read_six_numbers>
  40110b:	49 89 e6             	mov    %rsp,%r14//r14是数组的第一个元素
  40110e:	41 bc 00 00 00 00    	mov    $0x0,%r12d//r12是 大循环计数器
//输入六个数字,存放在数组中
  
大循环:
  401114:	4c 89 ed             	mov    %r13,%rbp
  401117:	41 8b 45 00          	mov    0x0(%r13),%eax//每个值<=6
  40111b:	83 e8 01             	sub    $0x1,%eax

  40111e:	83 f8 05             	cmp    $0x5,%eax
  401121:	76 05                	jbe    401128 <phase_6+0x34>//eax<=5(即输入的每个数字都要<=6)
  401123:	e8 12 03 00 00       	callq  40143a <explode_bomb>

  401128:	41 83 c4 01          	add    $0x1,%r12d//输入的字符串后移
  40112c:	41 83 fc 06          	cmp    $0x6,%r12d//共操作6次
  401130:	74 21                	je     401153 <phase_6+0x5f>
  401132:	44 89 e3             	mov    %r12d,%ebx

  401135:	48 63 c3             	movslq %ebx,%rax//??把r12d放入eax(为什么不直接放??)
  401138:	8b 04 84             	mov    (%rsp,%rax,4),%eax//把rsp指向的数组中的数字一一取出
  40113b:	39 45 00             	cmp    %eax,0x0(%rbp)
  40113e:	75 05                	jne    401145 <phase_6+0x51>//输入的每个数字不能相等
  401140:	e8 f5 02 00 00       	callq  40143a <explode_bomb>

  401145:	83 c3 01             	add    $0x1,%ebx//小循环计数器
  401148:	83 fb 05             	cmp    $0x5,%ebx//操作6次
  40114b:	7e e8                	jle    401135 <phase_6+0x41>

  40114d:	49 83 c5 04          	add    $0x4,%r13//rsp+4//rsp指向第二个数字
  401151:	eb c1                	jmp    401114 <phase_6+0x20>
  
//r12d==6
  401153:	48 8d 74 24 18       	lea    0x18(%rsp),%rsi
  401158:	4c 89 f0             	mov    %r14,%rax
  40115b:	b9 07 00 00 00       	mov    $0x7,%ecx
loop:
  401160:	89 ca                	mov    %ecx,%edx
  401162:	2b 10                	sub    (%rax),%edx
  401164:	89 10                	mov    %edx,(%rax)
  401166:	48 83 c0 04          	add    $0x4,%rax
  40116a:	48 39 f0             	cmp    %rsi,%rax//是否到达数组末尾的判断
  40116d:	75 f1                	jne    401160 <phase_6+0x6c>//7-数组内每个数字

  40116f:	be 00 00 00 00       	mov    $0x0,%esi
  401174:	eb 21                	jmp    401197 <phase_6+0xa3>
loop://大循环
  401176:	48 8b 52 08          	mov    0x8(%rdx),%rdx//rdx取链表内数字
  40117a:	83 c0 01             	add    $0x1,%eax//eax为temp
  40117d:	39 c8                	cmp    %ecx,%eax//查找链表内的数字,直到链表内数字与数组中取出的数字相等(链表内储存的数字见下图~其实就是node1存1,node2存2……)
  40117f:	75 f5                	jne    401176 <phase_6+0x82>
  401181:	eb 05                	jmp    401188 <phase_6+0x94>
//小循环
  401183:	ba d0 32 60 00       	mov    $0x6032d0,%edx//若该数字<=1,直接用链表的第一个结点
  401188:	48 89 54 74 20       	mov    %rdx,0x20(%rsp,%rsi,2)//把链表结点放进数组(另一个数组)
  40118d:	48 83 c6 04          	add    $0x4,%rsi
  401191:	48 83 fe 18          	cmp    $0x18,%rsi//是否操作完6个数
  401195:	74 14                	je     4011ab <phase_6+0xb7>

  401197:	8b 0c 34             	mov    (%rsp,%rsi,1),%ecx//ecx取数组内数字
  40119a:	83 f9 01             	cmp    $0x1,%ecx//每个数组内数字是否<=1
  40119d:	7e e4                	jle    401183 <phase_6+0x8f>

  40119f:	b8 01 00 00 00       	mov    $0x1,%eax//该数字>1
  4011a4:	ba d0 32 60 00       	mov    $0x6032d0,%edx
  4011a9:	eb cb                	jmp    401176 <phase_6+0x82>//按输入的六个数字把链表结点放到对应的数组里

  4011ab:	48 8b 5c 24 20       	mov    0x20(%rsp),%rbx
  4011b0:	48 8d 44 24 28       	lea    0x28(%rsp),%rax
  4011b5:	48 8d 74 24 50       	lea    0x50(%rsp),%rsi//NULL
  4011ba:	48 89 d9             	mov    %rbx,%rcx
 
(这里的loop比较难看懂,很重要~) 
loop:
  4011bd:	48 8b 10             	mov    (%rax),%rdx
  4011c0:	48 89 51 08          	mov    %rdx,0x8(%rcx)
  4011c4:	48 83 c0 08          	add    $0x8,%rax
  //按照数组内存放的链表结点的顺序,将其首尾重新连接
  4011c8:	48 39 f0             	cmp    %rsi,%rax//不等于NULL
  4011cb:	74 05                	je     4011d2 <phase_6+0xde>

  4011cd:	48 89 d1             	mov    %rdx,%rcx
  4011d0:	eb eb                	jmp    4011bd <phase_6+0xc9>

  4011d2:	48 c7 42 08 00 00 00 	movq   $0x0,0x8(%rdx)
  4011d9:	00 
  4011da:	bd 05 00 00 00       	mov    $0x5,%ebp//共比较5次
  
loop:
  4011df:	48 8b 43 08          	mov    0x8(%rbx),%rax
  4011e3:	8b 00                	mov    (%rax),%eax
  4011e5:	39 03                	cmp    %eax,(%rbx)
  4011e7:	7d 05                	jge    4011ee <phase_6+0xfa>//重新连接完的链表要递减,即可(见下解析)

  4011e9:	e8 4c 02 00 00       	callq  40143a <explode_bomb>
  4011ee:	48 8b 5b 08          	mov    0x8(%rbx),%rbx
  4011f2:	83 ed 01             	sub    $0x1,%ebp
  4011f5:	75 e8                	jne    4011df <phase_6+0xeb>
  
  4011f7:	48 83 c4 50          	add    $0x50,%rsp
  4011fb:	5b                   	pop    %rbx
  4011fc:	5d                   	pop    %rbp
  4011fd:	41 5c                	pop    %r12
  4011ff:	41 5d                	pop    %r13
  401201:	41 5e                	pop    %r14
  401203:	c3                   	retq   

链表内存放的数字~
在这里插入图片描述
第一列是存放的数字,第二列是序号,第三列是next的地址
(第二行失误……😂,其实按next的地址查就行)

发现重新连接后的链表要递减~
所以把链表的结点排排序: 3 4 5 6 1 2
因为经过了7-数组内数的操作
所以还原出需要输入的六个数:4 3 2 1 6 5
done!
答案: 4 3 2 1 6 5


竟然还没下课…那再写一个!

Secret Phase

先来康一下怎么触发隐藏关:

00000000004015c4 <phase_defused>:
  4015c4:	48 83 ec 78          	sub    $0x78,%rsp//开了好大的栈
  4015c8:	64 48 8b 04 25 28 00 	mov    %fs:0x28,%rax
  4015cf:	00 00 
  4015d1:	48 89 44 24 68       	mov    %rax,0x68(%rsp)
  4015d6:	31 c0                	xor    %eax,%eax//eax==0
  4015d8:	83 3d 81 21 20 00 06 	cmpl   $0x6,0x202181(%rip)        # 603760 <num_input_strings>//记录了闯关数,==6才能继续
  4015df:	75 5e                	jne    40163f <phase_defused+0x7b>//不等于6就无法触发咯

  4015e1:	4c 8d 44 24 10       	lea    0x10(%rsp),%r8
  4015e6:	48 8d 4c 24 0c       	lea    0xc(%rsp),%rcx
  4015eb:	48 8d 54 24 08       	lea    0x8(%rsp),%rdx
  4015f0:	be 19 26 40 00       	mov    $0x402619,%esi//phase 4输入 “%d %d %s” (这里见下图)
  4015f5:	bf 70 38 60 00       	mov    $0x603870,%edi
  4015fa:	e8 f1 f5 ff ff       	callq  400bf0 <__isoc99_sscanf@plt>
  4015ff:	83 f8 03             	cmp    $0x3,%eax//返回3
  401602:	75 31                	jne    401635 <phase_defused+0x71>

  401604:	be 22 26 40 00       	mov    $0x402622,%esi//“DrEvil”
  401609:	48 8d 7c 24 10       	lea    0x10(%rsp),%rdi
  40160e:	e8 25 fd ff ff       	callq  401338 <strings_not_equal>//返回0(可见我们输入的%s要和这个地址内的string相同)
  401613:	85 c0                	test   %eax,%eax
  401615:	75 1e                	jne    401635 <phase_defused+0x71>eax等于0才能触发
  401617:	bf f8 24 40 00       	m
  ov    $0x4024f8,%edi
  40161c:	e8 ef f4 ff ff       	callq  400b10 <puts@plt>
  401621:	bf 20 25 40 00       	mov    $0x402520,%edi
  401626:	e8 e5 f4 ff ff       	callq  400b10 <puts@plt>
  40162b:	b8 00 00 00 00       	mov    $0x0,%eax
  401630:	e8 0d fc ff ff       	callq  401242 <secret_phase>
//可以触发隐藏关啦
  401635:	bf 58 25 40 00       	mov    $0x402558,%edi
  40163a:	e8 d1 f4 ff ff       	callq  400b10 <puts@plt>//输出

  40163f:	48 8b 44 24 68       	mov    0x68(%rsp),%rax
  401644:	64 48 33 04 25 28 00 	xor    %fs:0x28,%rax
  40164b:	00 00 
  40164d:	74 05                	je     401654 <phase_defused+0x90>
  40164f:	e8 dc f4 ff ff       	callq  400b30 <__stack_chk_fail@plt>
  401654:	48 83 c4 78          	add    $0x78,%rsp
  401658:	c3                   	retq   
  401659:	90                   	nop
  40165a:	90                   	nop
  40165b:	90                   	nop
  40165c:	90                   	nop
  40165d:	90                   	nop
  40165e:	90                   	nop
  40165f:	90                   	nop

看到这么多地址真的不好奇吗,打进去看一下!
在这里插入图片描述
所以我们只要在第四关后输入和0x402622相等的字符串即可触发隐藏关(至于为什么是第四关…是网上大佬一个个查出来的??我就直接借鉴啦……)
好滴再看最后一关!
因为隐藏关调用了fun7而且有很大作用,我们先看fun7:

0000000000401204 <fun7>://找到与esi相等的元素 直到结束

  401204:	48 83 ec 08          	sub    $0x8,%rsp
  401208:	48 85 ff             	test   %rdi,%rdi//rdi是否为0
  40120b:	74 2b                	je     401238 <fun7+0x34>

  40120d:	8b 17                	mov    (%rdi),%edx
  40120f:	39 f2                	cmp    %esi,%edx
  401211:	7e 0d                	jle    401220 <fun7+0x1c>edx<=esi
  401213:	48 8b 7f 08          	mov    0x8(%rdi),%rdi//edx>esi
  401217:	e8 e8 ff ff ff       	callq  401204 <fun7>
  40121c:	01 c0                	add    %eax,%eax
  40121e:	eb 1d                	jmp    40123d <fun7+0x39>

  401220:	b8 00 00 00 00       	mov    $0x0,%eax
  401225:	39 f2                	cmp    %esi,%edx
  401227:	74 14                	je     40123d <fun7+0x39>//edx==esi退出

  401229:	48 8b 7f 10          	mov    0x10(%rdi),%rdi//edx<esi
  40122d:	e8 d2 ff ff ff       	callq  401204 <fun7>
  401232:	8d 44 00 01          	lea    0x1(%rax,%rax,1),%eax
  401236:	eb 05                	jmp    40123d <fun7+0x39>

  401238:	b8 ff ff ff ff       	mov    $0xffffffff,%eax//rdi==0,eax==ffffffff退出(未找到)
  40123d:	48 83 c4 08          	add    $0x8,%rsp
  401241:	c3                   	retq   
  

绕来绕去的,竟然还是递归呢
仔细看看~(最后一关辣!!) 因为secret phase需要这个函数的返回值是2,要让它返回2的方法是:链表的第一个数比输入值大,第二个数比输入值小,第三个数==输入值
看了大佬们的分析竟然是一棵二叉搜索树
似乎忘记截图了,这是第一次截的图:
在这里插入图片描述
n1要大于输入值,这样转到n21 ==8,8要小于输入值,然后应该要调出n32= =0x16,就是答案!
0x16= = 22要转化成十进制!!!失败了好多次,真是太粗心了
好了最后是隐藏关!

0000000000401242 <secret_phase>:
  401242:	53                   	push   %rbx
  401243:	e8 56 02 00 00       	callq  40149e <read_line>
  401248:	ba 0a 00 00 00       	mov    $0xa,%edx
  40124d:	be 00 00 00 00       	mov    $0x0,%esi
  401252:	48 89 c7             	mov    %rax,%rdi
  401255:	e8 76 f9 ff ff       	callq  400bd0 <strtol@plt>
  40125a:	48 89 c3             	mov    %rax,%rbx
  40125d:	8d 40 ff             	lea    -0x1(%rax),%eax
  401260:	3d e8 03 00 00       	cmp    $0x3e8,%eax
  401265:	76 05                	jbe    40126c <secret_phase+0x2a>//eax<=0x3e8
  401267:	e8 ce 01 00 00       	callq  40143a <explode_bomb>

  40126c:	89 de                	mov    %ebx,%esi
  40126e:	bf f0 30 60 00       	mov    $0x6030f0,%edi//0x24
  401273:	e8 8c ff ff ff       	callq  401204 <fun7>
  401278:	83 f8 02             	cmp    $0x2,%eax//必须找到且eax==2//返回值为2:大于、小于、等于esi(eax)
  
  40127b:	74 05                	je     401282 <secret_phase+0x40>
  40127d:	e8 b8 01 00 00       	callq  40143a <explode_bomb>

  401282:	bf 38 24 40 00       	mov    $0x402438,%edi
  401287:	e8 84 f8 ff ff       	callq  400b10 <puts@plt>
  40128c:	e8 33 03 00 00       	callq  4015c4 <phase_defused>
  401291:	5b                   	pop    %rbx
  401292:	c3                   	retq   
  401293:	90                   	nop
  401294:	90                   	nop
  401295:	90                   	nop
  401296:	90                   	nop
  401297:	90                   	nop
  401298:	90                   	nop
  401299:	90                   	nop
  40129a:	90                   	nop
  40129b:	90                   	nop
  40129c:	90                   	nop
  40129d:	90                   	nop
  40129e:	90                   	nop
  40129f:	90                   	nop

没有什么内容,触发后只要让fun7返回2,就拆掉所有的bomb啦


终于写完了bomblab,也是再复习一遍汇编,明天又要上ICS啦

  • 深入理解计算机基础第三版 课后习题选题做一下
  • 订正汇编的课后作业,复习PPT

参考了不少大佬的分析,第一次读汇编确实有点吃力,希望以后会更加熟练,冲冲冲!
&真的很感谢助教帮我看了好多次为什么不能用文档输入,虽然后来莫名其妙的好了……
期待下次lab~😊加油

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值