summaryrefslogtreecommitdiff
path: root/docs/posts/2023-10-04-bomb-lab.html
blob: 226487fc788d2f3203513656f8ba556b19ba5a29 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
<!DOCTYPE html>
<html lang="en">
<head>
    
    <link rel="stylesheet" href="/assets/main.css" />
    <link rel="stylesheet" href="/assets/sakura.css" />
    <meta charset="utf-8">
    <meta name="viewport" content="width=device-width, initial-scale=1.0">
    <title>Bomb Lab</title>
    <meta name="og:site_name" content="Navan Chauhan" />
    <link rel="canonical" href="https://web.navan.dev/" />
    <meta name="twitter:url" content="https://web.navan.dev/" />
    <meta name="og:url" content="https://web.navan.dev/" />
    <meta name="twitter:title" content="Bomb Lab" />
    <meta name="og:title" content="Bomb Lab" />
    <meta name="description" content="Walkthrough of Phases 1-6 of Bomb Lab for CSCI 2400 Computer Systems Lab 2" />
    <meta name="twitter:description" content="Walkthrough of Phases 1-6 of Bomb Lab for CSCI 2400 Computer Systems Lab 2" />
    <meta name="og:description" content="Walkthrough of Phases 1-6 of Bomb Lab for CSCI 2400 Computer Systems Lab 2" />
    <meta name="twitter:card" content="summary_large_image" />
    <meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <link rel="shortcut icon" href="/images/favicon.png" type="image/png" />
    <link rel="alternate" href="/feed.rss" type="application/rss+xml" title="Subscribe to Navan Chauhan" />
    <meta name="twitter:image" content="https://web.navan.dev/images/opengraph/posts/2023-10-04-bomb-lab.png" />
    <meta name="og:image" content="https://web.navan.dev/images/opengraph/posts/2023-10-04-bomb-lab.png" />
    <link rel="manifest" href="manifest.json" />
    <meta name="google-site-verification" content="LVeSZxz-QskhbEjHxOi7-BM5dDxTg53x2TwrjFxfL0k" />
    <script data-goatcounter="https://navanchauhan.goatcounter.com/count"
        async src="//gc.zgo.at/count.js"></script>
    <script defer data-domain="web.navan.dev" src="https://plausible.io/js/plausible.js"></script>
    <script defer data-domain="web.navan.dev" src="https://plausible.navan.dev/js/plausible.js"></script>
    <!-- Begin Inspectlet Asynchronous Code. Only for some testing, will be removed soon -->
    <script type="text/javascript">
    (function() {
    window.__insp = window.__insp || [];
    __insp.push(['wid', 1038401947]);
    var ldinsp = function(){
    if(typeof window.__inspld != "undefined") return; window.__inspld = 1; var insp = document.createElement('script'); insp.type = 'text/javascript'; insp.async = true; insp.id = "inspsync"; insp.src = ('https:' == document.location.protocol ? 'https' : 'http') + '://cdn.inspectlet.com/inspectlet.js?wid=1038401947&r=' + Math.floor(new Date().getTime()/3600000); var x = document.getElementsByTagName('script')[0]; x.parentNode.insertBefore(insp, x); };
    setTimeout(ldinsp, 0);
    })();
    </script>
    <!-- End Inspectlet Asynchronous Code -->
    
</head>
<body>
    <nav style="display: block;">
|
<a href="/">home</a> |
<a href="/about/">about/links</a> |
<a href="/posts/">posts</a> |
<a href="/publications/">publications</a> |
<a href="/repo/">iOS repo</a> |
<a href="/feed.rss">RSS Feed</a> |
</nav>
    
<main>

	<h1>Bomb Lab</h1>

<h2>Introduction</h2>

<p>Lab 2 for CSCI 2400 @ CU Boulder - Computer Systems</p>

<blockquote>
  <p>The nefarious Dr. Evil has planted a slew of “binary bombs” on our class machines. A binary bomb is a program that consists of a sequence of phases. Each phase expects you to type a particular string on stdin. If you type the correct string, then the phase is defused and the bomb proceeds to the next phase. Otherwise, the bomb explodes by printing "BOOM!!!" and then terminating. The bomb is defused when every phase has been defused.</p>
</blockquote>

<blockquote>
  <p>There are too many bombs for us to deal with, so we are giving each student a bomb to defuse. Your mission, which you have no choice but to accept, is to defuse your bomb before the due date. Good luck, and welcome to the bomb squad!</p>
</blockquote>

<p>I like using objdump to disassemble the code and get a broad overview of what is happening before I start. </p>

<p><code>objdump -d bomb &gt; dis.txt</code></p>

<p><em>Note: I am not sure about the history of the bomb lab. I think it started at CMU.</em></p>

<h2>Phase 1</h2>

<div class="codehilite">
<pre><span></span><code>joxxxn@jupyter-nxxh6xx8:~/lab2-bomblab-navanchauhan/bombbomb$ gdb -ex <span class="s1">&#39;break phase_1&#39;</span> -ex <span class="s1">&#39;break explode_bomb&#39;</span> -ex <span class="s1">&#39;run&#39;</span> ./bomb 
GNU gdb <span class="o">(</span>Ubuntu <span class="m">12</span>.1-0ubuntu1~22.04<span class="o">)</span> <span class="m">12</span>.1
Copyright <span class="o">(</span>C<span class="o">)</span> <span class="m">2022</span> Free Software Foundation, Inc.
License GPLv3+: GNU GPL version <span class="m">3</span> or later &lt;http://gnu.org/licenses/gpl.html&gt;
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type <span class="s2">&quot;show copying&quot;</span> and <span class="s2">&quot;show warranty&quot;</span> <span class="k">for</span> details.
This GDB was configured as <span class="s2">&quot;x86_64-linux-gnu&quot;</span>.
Type <span class="s2">&quot;show configuration&quot;</span> <span class="k">for</span> configuration details.
For bug reporting instructions, please see:
&lt;https://www.gnu.org/software/gdb/bugs/&gt;.
Find the GDB manual and other documentation resources online at:
    &lt;http://www.gnu.org/software/gdb/documentation/&gt;.

For help, <span class="nb">type</span> <span class="s2">&quot;help&quot;</span>.
Type <span class="s2">&quot;apropos word&quot;</span> to search <span class="k">for</span> commands related to <span class="s2">&quot;word&quot;</span>...
Reading symbols from ./bomb...
Breakpoint <span class="m">1</span> at 0x15c7
Breakpoint <span class="m">2</span> at 0x1d4a
Starting program: /home/joxxxn/lab2-bomblab-navanchauhan/bombbomb/bomb 
<span class="o">[</span>Thread debugging using libthread_db enabled<span class="o">]</span>
Using host libthread_db library <span class="s2">&quot;/lib/x86_64-linux-gnu/libthread_db.so.1&quot;</span>.
Welcome to my fiendish little bomb. You have <span class="m">6</span> phases with
which to blow yourself up. Have a nice day!
<span class="nb">test</span> string

Breakpoint <span class="m">1</span>, 0x00005555555555c7 <span class="k">in</span> phase_1 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> dias phase_1
Undefined command: <span class="s2">&quot;dias&quot;</span>.  Try <span class="s2">&quot;help&quot;</span>.
<span class="o">(</span>gdb<span class="o">)</span> disas phase_1
Dump of assembler code <span class="k">for</span> <span class="k">function</span> phase_1:
<span class="o">=</span>&gt; 0x00005555555555c7 &lt;+0&gt;:     endbr64 
   0x00005555555555cb &lt;+4&gt;:     sub    <span class="nv">$0</span>x8,%rsp
   0x00005555555555cf &lt;+8&gt;:     lea    0x1b7a<span class="o">(</span>%rip<span class="o">)</span>,%rsi        <span class="c1"># 0x555555557150</span>
   0x00005555555555d6 &lt;+15&gt;:    call   0x555555555b31 &lt;strings_not_equal&gt;
   0x00005555555555db &lt;+20&gt;:    <span class="nb">test</span>   %eax,%eax
   0x00005555555555dd &lt;+22&gt;:    jne    0x5555555555e4 &lt;phase_1+29&gt;
   0x00005555555555df &lt;+24&gt;:    add    <span class="nv">$0</span>x8,%rsp
   0x00005555555555e3 &lt;+28&gt;:    ret    
   0x00005555555555e4 &lt;+29&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x00005555555555e9 &lt;+34&gt;:    jmp    0x5555555555df &lt;phase_1+24&gt;
End of assembler dump.
<span class="o">(</span>gdb<span class="o">)</span> print 0x555555557150
<span class="nv">$1</span> <span class="o">=</span> <span class="m">93824992244048</span>
<span class="o">(</span>gdb<span class="o">)</span> x/1s 0x555555557150
0x555555557150: <span class="s2">&quot;Controlling complexity is the essence of computer programming.&quot;</span>
<span class="o">(</span>gdb<span class="o">)</span> 
</code></pre>
</div>

<h2>Phase 2</h2>

<div class="codehilite">
<pre><span></span><code>Phase <span class="m">1</span> defused. How about the next one?
<span class="m">1</span> <span class="m">2</span> <span class="m">3</span> <span class="m">4</span> <span class="m">5</span> <span class="m">6</span>

Breakpoint <span class="m">1</span>, 0x00005555555555eb <span class="k">in</span> phase_2 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> disas
Dump of assembler code <span class="k">for</span> <span class="k">function</span> phase_2:
<span class="o">=</span>&gt; 0x00005555555555eb &lt;+0&gt;:     endbr64 
   0x00005555555555ef &lt;+4&gt;:     push   %rbp
   0x00005555555555f0 &lt;+5&gt;:     push   %rbx
   0x00005555555555f1 &lt;+6&gt;:     sub    <span class="nv">$0</span>x28,%rsp
   0x00005555555555f5 &lt;+10&gt;:    mov    %rsp,%rsi
   0x00005555555555f8 &lt;+13&gt;:    call   0x555555555d97 &lt;read_six_numbers&gt;
   0x00005555555555fd &lt;+18&gt;:    cmpl   <span class="nv">$0</span>x0,<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555601 &lt;+22&gt;:    js     0x55555555560d &lt;phase_2+34&gt;
   0x0000555555555603 &lt;+24&gt;:    mov    %rsp,%rbp
   0x0000555555555606 &lt;+27&gt;:    mov    <span class="nv">$0</span>x1,%ebx
   0x000055555555560b &lt;+32&gt;:    jmp    0x555555555620 &lt;phase_2+53&gt;
   0x000055555555560d &lt;+34&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x0000555555555612 &lt;+39&gt;:    jmp    0x555555555603 &lt;phase_2+24&gt;
   0x0000555555555614 &lt;+41&gt;:    add    <span class="nv">$0</span>x1,%ebx
   0x0000555555555617 &lt;+44&gt;:    add    <span class="nv">$0</span>x4,%rbp
   0x000055555555561b &lt;+48&gt;:    cmp    <span class="nv">$0</span>x6,%ebx
   0x000055555555561e &lt;+51&gt;:    je     0x555555555631 &lt;phase_2+70&gt;
   0x0000555555555620 &lt;+53&gt;:    mov    %ebx,%eax
   0x0000555555555622 &lt;+55&gt;:    add    0x0<span class="o">(</span>%rbp<span class="o">)</span>,%eax
   0x0000555555555625 &lt;+58&gt;:    cmp    %eax,0x4<span class="o">(</span>%rbp<span class="o">)</span>
   0x0000555555555628 &lt;+61&gt;:    je     0x555555555614 &lt;phase_2+41&gt;
   0x000055555555562a &lt;+63&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x000055555555562f &lt;+68&gt;:    jmp    0x555555555614 &lt;phase_2+41&gt;
   0x0000555555555631 &lt;+70&gt;:    add    <span class="nv">$0</span>x28,%rsp
   0x0000555555555635 &lt;+74&gt;:    pop    %rbx
   0x0000555555555636 &lt;+75&gt;:    pop    %rbp
   0x0000555555555637 &lt;+76&gt;:    ret    
End of assembler dump.
<span class="o">(</span>gdb<span class="o">)</span> 
</code></pre>
</div>

<div class="codehilite">
<pre><span></span><code>   0x00005555555555fd &lt;+18&gt;:    cmpl   <span class="nv">$0</span>x0,<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555601 &lt;+22&gt;:    js     0x55555555560d &lt;phase_2+34&gt;
...
   0x000055555555560d &lt;+34&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
</code></pre>
</div>

<p>The program first compares if the first number is not 0. If the number is not 0, then the <code>cmpl</code> instruction returns a negative value. The <code>js</code> instruction stands for jump if sign -> causing a jump to the specified address if the sign bit is set. This would result in the explode_bomb function being called.
   <div class="codehilite">
   <pre><span></span><code>0x0000555555555603 &lt;+24&gt;:    mov    %rsp,%rbp
   0x0000555555555606 &lt;+27&gt;:    mov    <span class="nv">$0</span>x1,%ebx
   </code></pre>
   </div></p>

<p><code>%rsp</code> in x86-64 asm, is the stack pointer i.e. it points to the top of the current stack frame. Since the program just read six numbers, the top of the stack (<code>%rsp</code>) contains the address of the first number.</p>

<p>By executing <code>mov %rsp,%rbp</code> we are setting the base pointer (<code>%rbp</code>) to point to this address.</p>

<p>Now, for the second instruction <code>mov $0x1,%ebx</code>, we are initalising the <code>%ebx</code> register with the value 1. Based on the assembly code, you can see that this is being used as a counter/index for the loop.
   <div class="codehilite">
   <pre><span></span><code>0x000055555555560b &lt;+32&gt;:    jmp    0x555555555620 &lt;phase_2+53&gt;
   </code></pre>
   </div></p>

<p>The program now jumps to <phase_2+53>
   <div class="codehilite">
   <pre><span></span><code>0x0000555555555620 &lt;+53&gt;:    mov    %ebx,%eax
   0x0000555555555622 &lt;+55&gt;:    add    0x0<span class="o">(</span>%rbp<span class="o">)</span>,%eax
   0x0000555555555625 &lt;+58&gt;:    cmp    %eax,0x4<span class="o">(</span>%rbp<span class="o">)</span>
   0x0000555555555628 &lt;+61&gt;:    je     0x555555555614 &lt;phase_2+41&gt;
   </code></pre>
   </div></p>

<p>Here, the value from <code>%ebx</code> is copied to the <code>%eax</code> register. For this iteration, the value should be 1.</p>

<p>Then, the value at the memory location pointed by <code>%rbp</code> is added to the value in <code>%eax</code>. For now, 0 is added (the first number that we read).</p>

<p><code>cmp %eax,0x4(%rbp)</code> - The instruction compares the value in %eax to the value at the memory address <code>%rbp + 4</code>. Since Integers in this context are stored using a word of memory of 4 bytes, this indicates it checks against the second number in the sequence.</p>

<p><code>je 0x555555555614 &lt;phase_2+41&gt;</code> - The program will jump to <code>phase_2+41</code> if the previous <code>cmp</code> instruction determined the values as equal. 
   <div class="codehilite">
   <pre><span></span><code>0x0000555555555614 &lt;+41&gt;:    add    <span class="nv">$0</span>x1,%ebx
   0x0000555555555617 &lt;+44&gt;:    add    <span class="nv">$0</span>x4,%rbp
   0x000055555555561b &lt;+48&gt;:    cmp    <span class="nv">$0</span>x6,%ebx
   0x000055555555561e &lt;+51&gt;:    je     0x555555555631 &lt;phase<em>2+70&gt;
   0x0000555555555620 &lt;+53&gt;:    mov    %ebx,%eax
   0x0000555555555622 &lt;+55&gt;:    add    0x0<span class="o">(</span>%rbp<span class="o">)</span>,%eax
   0x0000555555555625 &lt;+58&gt;:    cmp    %eax,0x4<span class="o">(</span>%rbp<span class="o">)</span>
   0x0000555555555628 &lt;+61&gt;:    je     0x555555555614 &lt;phase</em>2+41&gt;
   </code></pre>
   </div></p>

<p>Here, we can see that the program increments <code>%ebx</code> by 1, adds a 4 byte offset to <code>%rbp</code> (the number we will be matching now), and checks if <code>%ebx</code> is equal to 6. If it is, it breaks the loop and jumps to <code>&lt;phase_2+70&gt;</code> succesfully finishing this stage.</p>

<p>Now, given that we know the first two numbers in the sequence are <code>0 1</code>, we can calculate the other numbers by following the pattern of adding the counter and the value of the previous number.</p>

<p>Thus,</p>

<ul>
<li>3rd number = 1 (previous value) + 2 = 3</li>
<li>4th number = 3 (prev value) + 3 = 6</li>
<li>5th number = 6 (prev value) + 4 = 10</li>
<li>6th number = 10 (prev value) + 5 = 15</li>
</ul>

<div class="codehilite">
<pre><span></span><code>...
Phase <span class="m">1</span> defused. How about the next one?
<span class="m">0</span> <span class="m">1</span> <span class="m">3</span> <span class="m">6</span> <span class="m">10</span> <span class="m">15</span>

Breakpoint <span class="m">1</span>, 0x00005555555555eb <span class="k">in</span> phase_2 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> <span class="k">continue</span>
Continuing.
That<span class="err">&#39;</span>s number <span class="m">2</span>.  Keep going!
</code></pre>
</div>

<h2>Phase 3</h2>

<p>Let us look at the disassembled code first</p>

<div class="codehilite">
<pre><span></span><code><span class="m">0000000000001638</span> &lt;phase_3&gt;:
    <span class="m">1638</span>:   f3 0f 1e fa             endbr64 
    163c:   <span class="m">48</span> <span class="m">83</span> ec <span class="m">18</span>             sub    <span class="nv">$0</span>x18,%rsp
    <span class="m">1640</span>:   <span class="m">48</span> 8d 4c <span class="m">24</span> <span class="m">07</span>          lea    0x7<span class="o">(</span>%rsp<span class="o">)</span>,%rcx
    <span class="m">1645</span>:   <span class="m">48</span> 8d <span class="m">54</span> <span class="m">24</span> 0c          lea    0xc<span class="o">(</span>%rsp<span class="o">)</span>,%rdx
    164a:   4c 8d <span class="m">44</span> <span class="m">24</span> <span class="m">08</span>          lea    0x8<span class="o">(</span>%rsp<span class="o">)</span>,%r8
    164f:   <span class="m">48</span> 8d <span class="m">35</span> <span class="m">60</span> 1b <span class="m">00</span> <span class="m">00</span>    lea    0x1b60<span class="o">(</span>%rip<span class="o">)</span>,%rsi        <span class="c1"># 31b6 &lt;_IO_stdin_used+0x1b6&gt;</span>
    <span class="m">1656</span>:   b8 <span class="m">00</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x0,%eax
    165b:   e8 <span class="m">80</span> <span class="nb">fc</span> ff ff          call   12e0 &lt;__isoc99_sscanf@plt&gt;
    <span class="m">1660</span>:   <span class="m">83</span> f8 <span class="m">02</span>                cmp    <span class="nv">$0</span>x2,%eax
    <span class="m">1663</span>:   7e <span class="m">20</span>                   jle    <span class="m">1685</span> &lt;phase_3+0x4d&gt;
    <span class="m">1665</span>:   <span class="m">83</span> 7c <span class="m">24</span> 0c <span class="m">07</span>          cmpl   <span class="nv">$0</span>x7,0xc<span class="o">(</span>%rsp<span class="o">)</span>
    166a:   0f <span class="m">87</span> 0d <span class="m">01</span> <span class="m">00</span> <span class="m">00</span>       ja     177d &lt;phase_3+0x145&gt;
    <span class="m">1670</span>:   8b <span class="m">44</span> <span class="m">24</span> 0c             mov    0xc<span class="o">(</span>%rsp<span class="o">)</span>,%eax
    <span class="m">1674</span>:   <span class="m">48</span> 8d <span class="m">15</span> <span class="m">55</span> 1b <span class="m">00</span> <span class="m">00</span>    lea    0x1b55<span class="o">(</span>%rip<span class="o">)</span>,%rdx        <span class="c1"># 31d0 &lt;_IO_stdin_used+0x1d0&gt;</span>
    167b:   <span class="m">48</span> <span class="m">63</span> <span class="m">04</span> <span class="m">82</span>             movslq <span class="o">(</span>%rdx,%rax,4<span class="o">)</span>,%rax
    167f:   <span class="m">48</span> <span class="m">01</span> d0                add    %rdx,%rax
    <span class="m">1682</span>:   3e ff e0                notrack jmp *%rax
    <span class="m">1685</span>:   e8 c0 <span class="m">06</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    168a:   eb d9                   jmp    <span class="m">1665</span> &lt;phase_3+0x2d&gt;
    168c:   b8 <span class="m">63</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x63,%eax
    <span class="m">1691</span>:   <span class="m">81</span> 7c <span class="m">24</span> <span class="m">08</span> 3d <span class="m">02</span> <span class="m">00</span>    cmpl   <span class="nv">$0</span>x23d,0x8<span class="o">(</span>%rsp<span class="o">)</span>
    <span class="m">1698</span>:   <span class="m">00</span> 
    <span class="m">1699</span>:   0f <span class="m">84</span> e8 <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>       je     <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    169f:   e8 a6 <span class="m">06</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    16a4:   b8 <span class="m">63</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x63,%eax
    16a9:   e9 d9 <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          jmp    <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    16ae:   b8 <span class="m">61</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x61,%eax
    16b3:   <span class="m">81</span> 7c <span class="m">24</span> <span class="m">08</span> <span class="m">27</span> <span class="m">01</span> <span class="m">00</span>    cmpl   <span class="nv">$0</span>x127,0x8<span class="o">(</span>%rsp<span class="o">)</span>
    16ba:   <span class="m">00</span> 
    16bb:   0f <span class="m">84</span> c6 <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>       je     <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    16c1:   e8 <span class="m">84</span> <span class="m">06</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    16c6:   b8 <span class="m">61</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x61,%eax
    16cb:   e9 b7 <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          jmp    <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    16d0:   b8 <span class="m">78</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x78,%eax
    16d5:   <span class="m">81</span> 7c <span class="m">24</span> <span class="m">08</span> e7 <span class="m">02</span> <span class="m">00</span>    cmpl   <span class="nv">$0</span>x2e7,0x8<span class="o">(</span>%rsp<span class="o">)</span>
    16dc:   <span class="m">00</span> 
    16dd:   0f <span class="m">84</span> a4 <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>       je     <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    16e3:   e8 <span class="m">62</span> <span class="m">06</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    16e8:   b8 <span class="m">78</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x78,%eax
    16ed:   e9 <span class="m">95</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          jmp    <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    16f2:   b8 <span class="m">64</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x64,%eax
    16f7:   <span class="m">81</span> 7c <span class="m">24</span> <span class="m">08</span> <span class="m">80</span> <span class="m">02</span> <span class="m">00</span>    cmpl   <span class="nv">$0</span>x280,0x8<span class="o">(</span>%rsp<span class="o">)</span>
    16fe:   <span class="m">00</span> 
    16ff:   0f <span class="m">84</span> <span class="m">82</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>       je     <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    <span class="m">1705</span>:   e8 <span class="m">40</span> <span class="m">06</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    170a:   b8 <span class="m">64</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x64,%eax
    170f:   eb <span class="m">76</span>                   jmp    <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    <span class="m">1711</span>:   b8 6d <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x6d,%eax
    <span class="m">1716</span>:   <span class="m">81</span> 7c <span class="m">24</span> <span class="m">08</span> ff <span class="m">02</span> <span class="m">00</span>    cmpl   <span class="nv">$0</span>x2ff,0x8<span class="o">(</span>%rsp<span class="o">)</span>
    171d:   <span class="m">00</span> 
    171e:   <span class="m">74</span> <span class="m">67</span>                   je     <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    <span class="m">1720</span>:   e8 <span class="m">25</span> <span class="m">06</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    <span class="m">1725</span>:   b8 6d <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x6d,%eax
    172a:   eb 5b                   jmp    <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    172c:   b8 <span class="m">71</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x71,%eax
    <span class="m">1731</span>:   <span class="m">81</span> 7c <span class="m">24</span> <span class="m">08</span> <span class="m">75</span> <span class="m">03</span> <span class="m">00</span>    cmpl   <span class="nv">$0</span>x375,0x8<span class="o">(</span>%rsp<span class="o">)</span>
    <span class="m">1738</span>:   <span class="m">00</span> 
    <span class="m">1739</span>:   <span class="m">74</span> 4c                   je     <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    173b:   e8 0a <span class="m">06</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    <span class="m">1740</span>:   b8 <span class="m">71</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x71,%eax
    <span class="m">1745</span>:   eb <span class="m">40</span>                   jmp    <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    <span class="m">1747</span>:   b8 <span class="m">79</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x79,%eax
    174c:   <span class="m">81</span> 7c <span class="m">24</span> <span class="m">08</span> <span class="m">94</span> <span class="m">02</span> <span class="m">00</span>    cmpl   <span class="nv">$0</span>x294,0x8<span class="o">(</span>%rsp<span class="o">)</span>
    <span class="m">1753</span>:   <span class="m">00</span> 
    <span class="m">1754</span>:   <span class="m">74</span> <span class="m">31</span>                   je     <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    <span class="m">1756</span>:   e8 ef <span class="m">05</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    175b:   b8 <span class="m">79</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x79,%eax
    <span class="m">1760</span>:   eb <span class="m">25</span>                   jmp    <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    <span class="m">1762</span>:   b8 <span class="m">79</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x79,%eax
    <span class="m">1767</span>:   <span class="m">81</span> 7c <span class="m">24</span> <span class="m">08</span> <span class="m">88</span> <span class="m">02</span> <span class="m">00</span>    cmpl   <span class="nv">$0</span>x288,0x8<span class="o">(</span>%rsp<span class="o">)</span>
    176e:   <span class="m">00</span> 
    176f:   <span class="m">74</span> <span class="m">16</span>                   je     <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    <span class="m">1771</span>:   e8 d4 <span class="m">05</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    <span class="m">1776</span>:   b8 <span class="m">79</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x79,%eax
    177b:   eb 0a                   jmp    <span class="m">1787</span> &lt;phase_3+0x14f&gt;
    177d:   e8 c8 <span class="m">05</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    <span class="m">1782</span>:   b8 <span class="m">68</span> <span class="m">00</span> <span class="m">00</span> <span class="m">00</span>          mov    <span class="nv">$0</span>x68,%eax
    <span class="m">1787</span>:   <span class="m">38</span> <span class="m">44</span> <span class="m">24</span> <span class="m">07</span>             cmp    %al,0x7<span class="o">(</span>%rsp<span class="o">)</span>
    178b:   <span class="m">75</span> <span class="m">05</span>                   jne    <span class="m">1792</span> &lt;phase_3+0x15a&gt;
    178d:   <span class="m">48</span> <span class="m">83</span> c4 <span class="m">18</span>             add    <span class="nv">$0</span>x18,%rsp
    <span class="m">1791</span>:   c3                      ret    
    <span class="m">1792</span>:   e8 b3 <span class="m">05</span> <span class="m">00</span> <span class="m">00</span>          call   1d4a &lt;explode_bomb&gt;
    <span class="m">1797</span>:   eb f4                   jmp    178d &lt;phase_3+0x155&gt;
</code></pre>
</div>

<div class="codehilite">
<pre><span></span><code>...
    165b:   e8 <span class="m">80</span> <span class="nb">fc</span> ff ff          call   12e0 &lt;__isoc99_sscanf@plt&gt;
...
</code></pre>
</div>

<p>We can see that <code>scanf</code> is being called which means we need to figure out what datatype(s) the program is expecting.</p>

<p>Because I do not want to enter the solutions to phases 1 and 2 again and again, I am goig to pass a file which has these solutions.</p>

<div class="codehilite">
<pre><span></span><code>joxxxn@jupyter-nxxh6xx8:~/lab2-bomblab-navanchauhan/bombbomb$ gdb -ex <span class="s1">&#39;break phase_3&#39;</span> -ex <span class="s1">&#39;break explode_bomb&#39;</span> -ex <span class="s1">&#39;run&#39;</span> -args ./bomb sol.txt 
GNU gdb <span class="o">(</span>Ubuntu <span class="m">12</span>.1-0ubuntu1~22.04<span class="o">)</span> <span class="m">12</span>.1
Copyright <span class="o">(</span>C<span class="o">)</span> <span class="m">2022</span> Free Software Foundation, Inc.
License GPLv3+: GNU GPL version <span class="m">3</span> or later &lt;http://gnu.org/licenses/gpl.html&gt;
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type <span class="s2">&quot;show copying&quot;</span> and <span class="s2">&quot;show warranty&quot;</span> <span class="k">for</span> details.
This GDB was configured as <span class="s2">&quot;x86_64-linux-gnu&quot;</span>.
Type <span class="s2">&quot;show configuration&quot;</span> <span class="k">for</span> configuration details.
For bug reporting instructions, please see:
&lt;https://www.gnu.org/software/gdb/bugs/&gt;.
Find the GDB manual and other documentation resources online at:
    &lt;http://www.gnu.org/software/gdb/documentation/&gt;.

For help, <span class="nb">type</span> <span class="s2">&quot;help&quot;</span>.
Type <span class="s2">&quot;apropos word&quot;</span> to search <span class="k">for</span> commands related to <span class="s2">&quot;word&quot;</span>...
Reading symbols from ./bomb...
Breakpoint <span class="m">1</span> at 0x1638
Breakpoint <span class="m">2</span> at 0x1d4a
Starting program: /home/joxxxn/lab2-bomblab-navanchauhan/bombbomb/bomb sol.txt
<span class="o">[</span>Thread debugging using libthread_db enabled<span class="o">]</span>
Using host libthread_db library <span class="s2">&quot;/lib/x86_64-linux-gnu/libthread_db.so.1&quot;</span>.
Welcome to my fiendish little bomb. You have <span class="m">6</span> phases with
which to blow yourself up. Have a nice day!
Phase <span class="m">1</span> defused. How about the next one?
That<span class="err">&#39;</span>s number <span class="m">2</span>.  Keep going!
random string

Breakpoint <span class="m">1</span>, 0x0000555555555638 <span class="k">in</span> phase_3 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> disas
Dump of assembler code <span class="k">for</span> <span class="k">function</span> phase_3:
<span class="o">=</span>&gt; 0x0000555555555638 &lt;+0&gt;:     endbr64 
   0x000055555555563c &lt;+4&gt;:     sub    <span class="nv">$0</span>x18,%rsp
   0x0000555555555640 &lt;+8&gt;:     lea    0x7<span class="o">(</span>%rsp<span class="o">)</span>,%rcx
   0x0000555555555645 &lt;+13&gt;:    lea    0xc<span class="o">(</span>%rsp<span class="o">)</span>,%rdx
   0x000055555555564a &lt;+18&gt;:    lea    0x8<span class="o">(</span>%rsp<span class="o">)</span>,%r8
   0x000055555555564f &lt;+23&gt;:    lea    0x1b60<span class="o">(</span>%rip<span class="o">)</span>,%rsi        <span class="c1"># 0x5555555571b6</span>
   0x0000555555555656 &lt;+30&gt;:    mov    <span class="nv">$0</span>x0,%eax
   0x000055555555565b &lt;+35&gt;:    call   0x5555555552e0 &lt;__isoc99_sscanf@plt&gt;
   0x0000555555555660 &lt;+40&gt;:    cmp    <span class="nv">$0</span>x2,%eax
   0x0000555555555663 &lt;+43&gt;:    jle    0x555555555685 &lt;phase_3+77&gt;
   0x0000555555555665 &lt;+45&gt;:    cmpl   <span class="nv">$0</span>x7,0xc<span class="o">(</span>%rsp<span class="o">)</span>
   0x000055555555566a &lt;+50&gt;:    ja     0x55555555577d &lt;phase_3+325&gt;
   0x0000555555555670 &lt;+56&gt;:    mov    0xc<span class="o">(</span>%rsp<span class="o">)</span>,%eax
   0x0000555555555674 &lt;+60&gt;:    lea    0x1b55<span class="o">(</span>%rip<span class="o">)</span>,%rdx        <span class="c1"># 0x5555555571d0</span>
   0x000055555555567b &lt;+67&gt;:    movslq <span class="o">(</span>%rdx,%rax,4<span class="o">)</span>,%rax
   0x000055555555567f &lt;+71&gt;:    add    %rdx,%rax
   0x0000555555555682 &lt;+74&gt;:    notrack jmp *%rax
   0x0000555555555685 &lt;+77&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x000055555555568a &lt;+82&gt;:    jmp    0x555555555665 &lt;phase_3+45&gt;
   0x000055555555568c &lt;+84&gt;:    mov    <span class="nv">$0</span>x63,%eax
   0x0000555555555691 &lt;+89&gt;:    cmpl   <span class="nv">$0</span>x23d,0x8<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555699 &lt;+97&gt;:    je     0x555555555787 &lt;phase_3+335&gt;
   0x000055555555569f &lt;+103&gt;:   call   0x555555555d4a &lt;explode_bomb&gt;
   0x00005555555556a4 &lt;+108&gt;:   mov    <span class="nv">$0</span>x63,%eax
   0x00005555555556a9 &lt;+113&gt;:   jmp    0x555555555787 &lt;phase_3+335&gt;
--Type &lt;RET&gt; <span class="k">for</span> more, q to quit, c to <span class="k">continue</span> without paging--
</code></pre>
</div>

<p><code>gdb</code> has thankfully marked the address which is being passed to <code>scanf</code>. We can access the value:</p>

<div class="codehilite">
<pre><span></span><code><span class="o">(</span>gdb<span class="o">)</span> x/1s 0x5555555571b6
0x5555555571b6: <span class="s2">&quot;%d %c %d&quot;</span>
<span class="o">(</span>gdb<span class="o">)</span> 
</code></pre>
</div>

<p>BINGO! The program expects an integer, character, and another integer. Onwards.</p>

<div class="codehilite">
<pre><span></span><code>   0x0000555555555660 &lt;+40&gt;:    cmp    <span class="nv">$0</span>x2,%eax
   0x0000555555555663 &lt;+43&gt;:    jle    0x555555555685 &lt;phase_3+77&gt;
...
   0x0000555555555685 &lt;+77&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
</code></pre>
</div>

<p>The program checks whether <code>scanf</code> returns a value &lt;= 2, if it does then it calls the <code>explode_bomb</code> function. </p>

<p><em>Note: <code>scanf</code> returns the number of fields that were succesfully converted and assigned</em></p>

<div class="codehilite">
<pre><span></span><code>   0x0000555555555665 &lt;+45&gt;:    cmpl   <span class="nv">$0</span>x7,0xc<span class="o">(</span>%rsp<span class="o">)</span>
   0x000055555555566a &lt;+50&gt;:    ja     0x55555555577d &lt;phase_3+325&gt;
...
   0x000055555555577d &lt;+325&gt;:   call   0x555555555d4a &lt;explode_bomb&gt;
</code></pre>
</div>

<p>Similarly, the program checks and ensures the returned value is not &gt; 7. 
   <div class="codehilite">
   <pre><span></span><code>0x0000555555555670 &lt;+56&gt;:    mov    0xc<span class="o">(</span>%rsp<span class="o">)</span>,%eax
   0x0000555555555674 &lt;+60&gt;:    lea    0x1b55<span class="o">(</span>%rip<span class="o">)</span>,%rdx        <span class="c1"># 0x5555555571d0</span>
   0x000055555555567b &lt;+67&gt;:    movslq <span class="o">(</span>%rdx,%rax,4<span class="o">)</span>,%rax
   0x000055555555567f &lt;+71&gt;:    add    %rdx,%rax
   0x0000555555555682 &lt;+74&gt;:    notrack jmp *%rax
   0x0000555555555685 &lt;+77&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   </code></pre>
   </div></p>

<ul>
<li><code>0x0000555555555670 &lt;+56&gt;:    mov    0xc(%rsp),%eax</code> - Moves value located at <code>0xc</code> (12 in Decimal) bytes above the stack pointer to <code>%eax</code> register. </li>
<li><code>0x0000555555555674 &lt;+60&gt;:    lea    0x1b55(%rip),%rdx        # 0x5555555571d0</code> - This instruction calculates an effective address by adding <code>0x1b55</code> to the current instruction pointer (<code>%rip</code>). The result is stored in the <code>%rdx</code> register. </li>
<li><code>0x000055555555567b &lt;+67&gt;:    movslq (%rdx,%rax,4),%rax</code>
<ul>
<li><code>movslq</code> stands for "move with sign-extension from a 32-bit value to a 64-bit value." (if the 32-bit value is negative, the 64-bit result will have all its upper 32 bits set to 1; otherwise, they'll be set to 0). </li>
<li><code>(%rdx,%rax,4)</code> - First start with the value in the %rdx register, then add to it the value in the %rax register multiplied by 4.</li>
<li><code>%rax</code> - Destination Register</li>
</ul></li>
<li><code>0x000055555555567f &lt;+71&gt;:    add    %rdx,%rax</code> - Adds base address in <code>%rdx</code> to the offset in <code>%rax</code> </li>
<li><code>0x0000555555555682 &lt;+74&gt;:    notrack jmp *%rax</code> - Jumps to the address stored in <code>%rax</code></li>
<li><code>0x0000555555555685 &lt;+77&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;</code> - If we are unable to jump to the specified instruction, call <code>explode_bomb</code></li>
</ul>

<p>Let us try to run the program again with a valid input for the first number and see what the program is computing for the address.</p>

<p>I used the input: <code>3 c 123</code>.</p>

<p>To check what is the computed address, we can switch to the asm layout by running <code>layout asm</code>, and then going through instructions <code>ni</code> or <code>si</code> until we reach the line <code>movslq (%rdx,%rax,4),%rax</code></p>

<p><code>%rax</code> should hold the value 3.</p>

<pre><code>(gdb) print $rax
$1 = 3
</code></pre>

<p><img src="/assets/bomb-lab/phase-3.png" alt="Screenshot of GDB terminal depicting us checking the value of the instruction to be jumped to" /></p>

<p>We can see that this makes us jump to <code>&lt;phase_3+186&gt;</code> (Continue to step through the code by using <code>ni</code>)
   <div class="codehilite">
   <pre><span></span><code>0x00005555555556f2 &lt;+186&gt;:   mov    <span class="nv">$0</span>x64,%eax
   0x00005555555556f7 &lt;+191&gt;:   cmpl   <span class="nv">$0</span>x280,0x8<span class="o">(</span>%rsp<span class="o">)</span>
   0x00005555555556ff &lt;+199&gt;:   je     0x555555555787 &lt;phase<em>3+335&gt;
   0x0000555555555705 &lt;+205&gt;:   call   0x555555555d4a &lt;explode</em>bomb&gt;
   </code></pre>
   </div></p>

<p>We see that <code>0x64</code> (Decimal 100) is being stored in <code>%eax</code>. Then, the program compares <code>0x280</code> (Decimal 640) with memory address <code>0x8</code> bytes above the stack pointer (<code>%rsp</code>). If the values are equal, then it jumps to <code>&lt;phase_3+335&gt;</code>, otherwise <code>explode_bomb</code> is called.
   <div class="codehilite">
   <pre><span></span><code>0x0000555555555787 &lt;+335&gt;:   cmp    %al,0x7<span class="o">(</span>%rsp<span class="o">)</span>
   0x000055555555578b &lt;+339&gt;:   jne    0x555555555792 &lt;phase<em>3+346&gt;
   0x000055555555578d &lt;+341&gt;:   add    <span class="nv">$0</span>x18,%rsp
   0x0000555555555791 &lt;+345&gt;:   ret <br />
   0x0000555555555792 &lt;+346&gt;:   call   0x555555555d4a &lt;explode</em>bomb&gt;
   </code></pre>
   </div></p>

<p>Here, the program is comparing the value of our given character to the value stored in <code>%al</code> (lower 8 bits of <code>EAX</code>), and checks if they are not equal.</p>

<p>Knowing that the character is stored at an offset of 7 bytes to <code>%rsp</code>, we can print and check the value by running:</p>

<div class="codehilite">
<pre><span></span><code><span class="o">(</span>gdb<span class="o">)</span> x/1cw <span class="nv">$rsp</span>+7
c
<span class="o">(</span>gdb<span class="o">)</span> print <span class="nv">$al</span>
<span class="nv">$1</span> <span class="o">=</span> <span class="m">100</span>
</code></pre>
</div>

<p>We can simply lookup the <a rel="noopener" target="_blank" href="https://www.cs.cmu.edu/~pattis/15-1XX/common/handouts/ascii.html">ASCII table</a>, and see that 100 in decimal stands for the character <code>d</code>. Let us try this answer:</p>

<div class="codehilite">
<pre><span></span><code>...
That<span class="err">&#39;</span>s number <span class="m">2</span>.  Keep going!
<span class="m">3</span> d <span class="m">640</span>

Breakpoint <span class="m">1</span>, 0x0000555555555638 <span class="k">in</span> phase_3 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> <span class="k">continue</span>
Continuing.
Halfway there!
</code></pre>
</div>

<h2>Phase 4</h2>

<div class="codehilite">
<pre><span></span><code>joxxxn@jupyter-nxxh6xx8:~/lab2-bomblab-navanchauhan/bombbomb$ gdb -ex <span class="s1">&#39;break phase_4&#39;</span> -ex <span class="s1">&#39;break explode_bomb&#39;</span> -ex <span class="s1">&#39;run&#39;</span> -args ./bomb sol.txt 
GNU gdb <span class="o">(</span>Ubuntu <span class="m">12</span>.1-0ubuntu1~22.04<span class="o">)</span> <span class="m">12</span>.1
Copyright <span class="o">(</span>C<span class="o">)</span> <span class="m">2022</span> Free Software Foundation, Inc.
License GPLv3+: GNU GPL version <span class="m">3</span> or later &lt;http://gnu.org/licenses/gpl.html&gt;
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type <span class="s2">&quot;show copying&quot;</span> and <span class="s2">&quot;show warranty&quot;</span> <span class="k">for</span> details.
This GDB was configured as <span class="s2">&quot;x86_64-linux-gnu&quot;</span>.
Type <span class="s2">&quot;show configuration&quot;</span> <span class="k">for</span> configuration details.
For bug reporting instructions, please see:
&lt;https://www.gnu.org/software/gdb/bugs/&gt;.
Find the GDB manual and other documentation resources online at:
    &lt;http://www.gnu.org/software/gdb/documentation/&gt;.

For help, <span class="nb">type</span> <span class="s2">&quot;help&quot;</span>.
Type <span class="s2">&quot;apropos word&quot;</span> to search <span class="k">for</span> commands related to <span class="s2">&quot;word&quot;</span>...
Reading symbols from ./bomb...
Breakpoint <span class="m">1</span> at 0x17d3
Breakpoint <span class="m">2</span> at 0x1d4a
Starting program: /home/joxxxn/lab2-bomblab-navanchauhan/bombbomb/bomb sol.txt
<span class="o">[</span>Thread debugging using libthread_db enabled<span class="o">]</span>
Using host libthread_db library <span class="s2">&quot;/lib/x86_64-linux-gnu/libthread_db.so.1&quot;</span>.
Welcome to my fiendish little bomb. You have <span class="m">6</span> phases with
which to blow yourself up. Have a nice day!
Phase <span class="m">1</span> defused. How about the next one?
That<span class="err">&#39;</span>s number <span class="m">2</span>.  Keep going!
Halfway there!
<span class="nb">test</span> string

Breakpoint <span class="m">1</span>, 0x00005555555557d3 <span class="k">in</span> phase_4 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> disas phase_4
Dump of assembler code <span class="k">for</span> <span class="k">function</span> phase_4:
<span class="o">=</span>&gt; 0x00005555555557d3 &lt;+0&gt;:     endbr64 
   0x00005555555557d7 &lt;+4&gt;:     sub    <span class="nv">$0</span>x18,%rsp
   0x00005555555557db &lt;+8&gt;:     lea    0x8<span class="o">(</span>%rsp<span class="o">)</span>,%rcx
   0x00005555555557e0 &lt;+13&gt;:    lea    0xc<span class="o">(</span>%rsp<span class="o">)</span>,%rdx
   0x00005555555557e5 &lt;+18&gt;:    lea    0x1bba<span class="o">(</span>%rip<span class="o">)</span>,%rsi        <span class="c1"># 0x5555555573a6</span>
   0x00005555555557ec &lt;+25&gt;:    mov    <span class="nv">$0</span>x0,%eax
   0x00005555555557f1 &lt;+30&gt;:    call   0x5555555552e0 &lt;__isoc99_sscanf@plt&gt;
   0x00005555555557f6 &lt;+35&gt;:    cmp    <span class="nv">$0</span>x2,%eax
   0x00005555555557f9 &lt;+38&gt;:    jne    0x555555555802 &lt;phase_4+47&gt;
   0x00005555555557fb &lt;+40&gt;:    cmpl   <span class="nv">$0</span>xe,0xc<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555800 &lt;+45&gt;:    jbe    0x555555555807 &lt;phase_4+52&gt;
   0x0000555555555802 &lt;+47&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x0000555555555807 &lt;+52&gt;:    mov    <span class="nv">$0</span>xe,%edx
   0x000055555555580c &lt;+57&gt;:    mov    <span class="nv">$0</span>x0,%esi
   0x0000555555555811 &lt;+62&gt;:    mov    0xc<span class="o">(</span>%rsp<span class="o">)</span>,%edi
   0x0000555555555815 &lt;+66&gt;:    call   0x555555555799 &lt;func4&gt;
   0x000055555555581a &lt;+71&gt;:    cmp    <span class="nv">$0</span>x2,%eax
   0x000055555555581d &lt;+74&gt;:    jne    0x555555555826 &lt;phase_4+83&gt;
   0x000055555555581f &lt;+76&gt;:    cmpl   <span class="nv">$0</span>x2,0x8<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555824 &lt;+81&gt;:    je     0x55555555582b &lt;phase_4+88&gt;
   0x0000555555555826 &lt;+83&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x000055555555582b &lt;+88&gt;:    add    <span class="nv">$0</span>x18,%rsp
   0x000055555555582f &lt;+92&gt;:    ret    
End of assembler dump.
<span class="o">(</span>gdb<span class="o">)</span> 
</code></pre>
</div>

<p>Again, <code>gdb</code> has marked the string being passed to <code>scanf</code></p>

<div class="codehilite">
<pre><span></span><code><span class="o">(</span>gdb<span class="o">)</span> x/1s 0x5555555573a6
0x5555555573a6: <span class="s2">&quot;%d %d&quot;</span>
</code></pre>
</div>

<p>Okay, so this time we are supposed to enter 2 numbers.
   <div class="codehilite">
   <pre><span></span><code>0x00005555555557f6 &lt;+35&gt;:    cmp    <span class="nv">$0</span>x2,%eax
   0x00005555555557f9 &lt;+38&gt;:    jne    0x555555555802 &lt;phase_4+47&gt;
   </code></pre>
   </div></p>

<p>Checks if there were 2 values read from calling <code>scanf</code>, if not -> jump to <code>&lt;phase_4+47&gt;</code> which calls <code>&lt;explode_bomb&gt;</code>.
   <div class="codehilite">
   <pre><span></span><code>0x00005555555557fb &lt;+40&gt;:    cmpl   <span class="nv">$0</span>xe,0xc<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555800 &lt;+45&gt;:    jbe    0x555555555807 &lt;phase_4+52&gt;
   </code></pre>
   </div></p>

<p>Compare <code>0xe</code> (14 in Decimal) and value stored at <code>$rsp</code> + <code>0xc</code> bytes (Decimal 12). If this condition is met (&lt;= 14), jump to <code>&lt;phase_4+52&gt;</code>. If not, then explode bomb.</p>

<div class="codehilite">
<pre><span></span><code>...
   0x0000555555555807 &lt;+52&gt;:    mov    <span class="nv">$0</span>xe,%edx
   0x000055555555580c &lt;+57&gt;:    mov    <span class="nv">$0</span>x0,%esi
   0x0000555555555811 &lt;+62&gt;:    mov    0xc<span class="o">(</span>%rsp<span class="o">)</span>,%edi
   0x0000555555555815 &lt;+66&gt;:    call   0x555555555799 &lt;func4&gt;
   0x000055555555581a &lt;+71&gt;:    cmp    <span class="nv">$0</span>x2,%eax
   0x000055555555581d &lt;+74&gt;:    jne    0x555555555826 &lt;phase_4+83&gt;
   0x000055555555581f &lt;+76&gt;:    cmpl   <span class="nv">$0</span>x2,0x8<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555824 &lt;+81&gt;:    je     0x55555555582b &lt;phase_4+88&gt;
   0x0000555555555826 &lt;+83&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
</code></pre>
</div>

<ul>
<li><code>0x0000555555555815 &lt;+66&gt;:    call   0x555555555799 &lt;func4&gt;</code> calls another function called <code>func4</code></li>
<li>The returned value is compared with <code>0x2</code>, if they are not equal then the program jumps to call <code>&lt;explode_bomb&gt;</code>. This tells us that <code>func4</code> should return 2.</li>
</ul>

<p>Let us look into <code>func4</code></p>

<div class="codehilite">
<pre><span></span><code><span class="o">(</span>gdb<span class="o">)</span> disas func4
Dump of assembler code <span class="k">for</span> <span class="k">function</span> func4:
   0x0000555555555799 &lt;+0&gt;:     endbr64 
   0x000055555555579d &lt;+4&gt;:     sub    <span class="nv">$0</span>x8,%rsp
   0x00005555555557a1 &lt;+8&gt;:     mov    %edx,%ecx
   0x00005555555557a3 &lt;+10&gt;:    sub    %esi,%ecx
   0x00005555555557a5 &lt;+12&gt;:    shr    %ecx
   0x00005555555557a7 &lt;+14&gt;:    add    %esi,%ecx
   0x00005555555557a9 &lt;+16&gt;:    cmp    %edi,%ecx
   0x00005555555557ab &lt;+18&gt;:    ja     0x5555555557b9 &lt;func4+32&gt;
   0x00005555555557ad &lt;+20&gt;:    mov    <span class="nv">$0</span>x0,%eax
   0x00005555555557b2 &lt;+25&gt;:    jb     0x5555555557c5 &lt;func4+44&gt;
   0x00005555555557b4 &lt;+27&gt;:    add    <span class="nv">$0</span>x8,%rsp
   0x00005555555557b8 &lt;+31&gt;:    ret    
   0x00005555555557b9 &lt;+32&gt;:    lea    -0x1<span class="o">(</span>%rcx<span class="o">)</span>,%edx
   0x00005555555557bc &lt;+35&gt;:    call   0x555555555799 &lt;func4&gt;
   0x00005555555557c1 &lt;+40&gt;:    add    %eax,%eax
   0x00005555555557c3 &lt;+42&gt;:    jmp    0x5555555557b4 &lt;func4+27&gt;
   0x00005555555557c5 &lt;+44&gt;:    lea    0x1<span class="o">(</span>%rcx<span class="o">)</span>,%esi
   0x00005555555557c8 &lt;+47&gt;:    call   0x555555555799 &lt;func4&gt;
   0x00005555555557cd &lt;+52&gt;:    lea    0x1<span class="o">(</span>%rax,%rax,1<span class="o">)</span>,%eax
   0x00005555555557d1 &lt;+56&gt;:    jmp    0x5555555557b4 &lt;func4+27&gt;
</code></pre>
</div>

<p>This looks like a recursive function :(  (I hate recursive functions)</p>

<p>Let's annotate the instructions.</p>

<div class="codehilite">
<pre><span></span><code>endbr64
sub <span class="nv">$0</span>x8,%rsp  // subtract <span class="m">8</span> bytes from the stack pointer
mov %edx,%ecx  // Move the value <span class="k">in</span> register %edx to %ecx
sub %esi,%ecx  // Subtract the value <span class="k">in</span> %esi from %ecx
shr %ecx       // Right <span class="nb">shift</span> the value <span class="k">in</span> %ecx by one bit <span class="o">(</span>dividing the value by <span class="m">2</span><span class="o">)</span>
add %esi,%ecx  // Add the value <span class="k">in</span> %esi to %ecx
cmp %edi,%ecx  // Compare
ja 0x5555555557b9 &lt;func4+32&gt; // If %ecx &gt; %edi -&gt; jump to instruction at offset +32
mov <span class="nv">$0</span>x0,%eax  // Move <span class="m">0</span> to %eax
jb 0x5555555557c5 &lt;func4+44&gt; // If %ecx &lt; %edi -&gt; jump to instruction at offset +44.
add <span class="nv">$0</span>x8,%rsp  // add <span class="m">8</span> bytes to the stack pointer
ret            // <span class="k">return</span>
lea -0x1<span class="o">(</span>%rcx<span class="o">)</span>,%edx // LEA of <span class="nv">$rxc</span> - <span class="m">1</span> into <span class="nv">$edx</span>
call 0x555555555799 &lt;func4&gt; // Call itself
add %eax,%eax  // Double the value <span class="k">in</span> %eax
jmp 0x5555555557b4 &lt;func4+27&gt; // jump to the instruction at offset +27
lea 0x1<span class="o">(</span>%rcx<span class="o">)</span>,%esi
call 0x555555555799 &lt;func4&gt;
lea 0x1<span class="o">(</span>%rax,%rax,1<span class="o">)</span>,%eax // LEA of %rax * <span class="m">2</span> + <span class="m">1</span> into <span class="nv">$eax</span> 
jmp 0x5555555557b4 &lt;func4+27&gt;
</code></pre>
</div>

<p>We can either try to compute the values by hand, or write a simple script in Python to get the answer.</p>

<div class="codehilite">
<pre><span></span><code><span class="k">def</span> <span class="nf">func4</span><span class="p">(</span><span class="n">edi</span><span class="p">,</span> <span class="n">esi</span><span class="o">=</span><span class="mi">0</span><span class="p">,</span> <span class="n">edx</span><span class="o">=</span><span class="mi">20</span><span class="p">):</span>
    <span class="n">ecx</span> <span class="o">=</span> <span class="p">(</span><span class="n">edx</span> <span class="o">-</span> <span class="n">esi</span><span class="p">)</span> <span class="o">//</span> <span class="mi">2</span> <span class="o">+</span> <span class="n">esi</span>
    <span class="k">if</span> <span class="n">ecx</span> <span class="o">&gt;</span> <span class="n">edi</span><span class="p">:</span>
        <span class="k">return</span> <span class="mi">2</span> <span class="o">*</span> <span class="n">func4</span><span class="p">(</span><span class="n">edi</span><span class="p">,</span> <span class="n">esi</span><span class="p">,</span> <span class="n">ecx</span> <span class="o">-</span> <span class="mi">1</span><span class="p">)</span>
    <span class="k">elif</span> <span class="n">ecx</span> <span class="o">&lt;</span> <span class="n">edi</span><span class="p">:</span>
        <span class="k">return</span> <span class="mi">2</span> <span class="o">*</span> <span class="n">func4</span><span class="p">(</span><span class="n">edi</span><span class="p">,</span> <span class="n">ecx</span> <span class="o">+</span> <span class="mi">1</span><span class="p">,</span> <span class="n">edx</span><span class="p">)</span> <span class="o">+</span> <span class="mi">1</span>
    <span class="k">else</span><span class="p">:</span>
        <span class="k">return</span> <span class="mi">0</span>

<span class="k">for</span> <span class="n">x</span> <span class="ow">in</span> <span class="nb">range</span><span class="p">(</span><span class="mi">15</span><span class="p">):</span> <span class="c1"># We can limit to 14</span>
   <span class="k">if</span> <span class="n">func4</span><span class="p">(</span><span class="n">x</span><span class="p">)</span> <span class="o">==</span> <span class="mi">2</span><span class="p">:</span>
      <span class="nb">print</span><span class="p">(</span><span class="sa">f</span><span class="s2">&quot;answer is </span><span class="si">{</span><span class="n">x</span><span class="si">}</span><span class="s2">&quot;</span><span class="p">)</span>
      <span class="k">break</span>
</code></pre>
</div>

<p>Running this code, we get: <code>answer is 5</code></p>

<p>Okay, so we know that the number needed to be passed to <code>func4</code> is 5. But, what about the second digit?</p>

<p>If we go back to the code for <code>&lt;phase_4&gt;</code>, we can see that:
   <div class="codehilite">
   <pre><span></span><code>0x000055555555581f &lt;+76&gt;:    cmpl   <span class="nv">$0</span>x2,0x8<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555824 &lt;+81&gt;:    je     0x55555555582b &lt;phase_4+88&gt;
   </code></pre>
   </div></p>

<p>The value at <code>$rsp+8</code> should be equal to 2. So, let us try passing <code>5 2</code> as our input.</p>

<div class="codehilite">
<pre><span></span><code>...
Phase <span class="m">1</span> defused. How about the next one?
That<span class="err">&#39;</span>s number <span class="m">2</span>.  Keep going!
Halfway there!
<span class="m">5</span> <span class="m">2</span>

Breakpoint <span class="m">1</span>, 0x00005555555557d3 <span class="k">in</span> phase_4 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> <span class="k">continue</span>
Continuing.
So you got that one.  Try this one.
</code></pre>
</div>

<h2>Phase 5</h2>

<div class="codehilite">
<pre><span></span><code>So you got that one.  Try this one.
<span class="nb">test</span> string

Breakpoint <span class="m">1</span>, 0x0000555555555830 <span class="k">in</span> phase_5 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> disas phase_5
Dump of assembler code <span class="k">for</span> <span class="k">function</span> phase_5:
<span class="o">=</span>&gt; 0x0000555555555830 &lt;+0&gt;:     endbr64 
   0x0000555555555834 &lt;+4&gt;:     push   %rbx
   0x0000555555555835 &lt;+5&gt;:     sub    <span class="nv">$0</span>x10,%rsp
   0x0000555555555839 &lt;+9&gt;:     mov    %rdi,%rbx
   0x000055555555583c &lt;+12&gt;:    call   0x555555555b10 &lt;string_length&gt;
   0x0000555555555841 &lt;+17&gt;:    cmp    <span class="nv">$0</span>x6,%eax
   0x0000555555555844 &lt;+20&gt;:    jne    0x55555555588b &lt;phase_5+91&gt;
   0x0000555555555846 &lt;+22&gt;:    mov    <span class="nv">$0</span>x0,%eax
   0x000055555555584b &lt;+27&gt;:    lea    0x199e<span class="o">(</span>%rip<span class="o">)</span>,%rcx        <span class="c1"># 0x5555555571f0 &lt;array.0&gt;</span>
   0x0000555555555852 &lt;+34&gt;:    movzbl <span class="o">(</span>%rbx,%rax,1<span class="o">)</span>,%edx
   0x0000555555555856 &lt;+38&gt;:    and    <span class="nv">$0</span>xf,%edx
   0x0000555555555859 &lt;+41&gt;:    movzbl <span class="o">(</span>%rcx,%rdx,1<span class="o">)</span>,%edx
   0x000055555555585d &lt;+45&gt;:    mov    %dl,0x9<span class="o">(</span>%rsp,%rax,1<span class="o">)</span>
   0x0000555555555861 &lt;+49&gt;:    add    <span class="nv">$0</span>x1,%rax
   0x0000555555555865 &lt;+53&gt;:    cmp    <span class="nv">$0</span>x6,%rax
   0x0000555555555869 &lt;+57&gt;:    jne    0x555555555852 &lt;phase_5+34&gt;
   0x000055555555586b &lt;+59&gt;:    movb   <span class="nv">$0</span>x0,0xf<span class="o">(</span>%rsp<span class="o">)</span>
   0x0000555555555870 &lt;+64&gt;:    lea    0x9<span class="o">(</span>%rsp<span class="o">)</span>,%rdi
   0x0000555555555875 &lt;+69&gt;:    lea    0x1943<span class="o">(</span>%rip<span class="o">)</span>,%rsi        <span class="c1"># 0x5555555571bf</span>
   0x000055555555587c &lt;+76&gt;:    call   0x555555555b31 &lt;strings_not_equal&gt;
   0x0000555555555881 &lt;+81&gt;:    <span class="nb">test</span>   %eax,%eax
   0x0000555555555883 &lt;+83&gt;:    jne    0x555555555892 &lt;phase_5+98&gt;
   0x0000555555555885 &lt;+85&gt;:    add    <span class="nv">$0</span>x10,%rsp
   0x0000555555555889 &lt;+89&gt;:    pop    %rbx
   0x000055555555588a &lt;+90&gt;:    ret    
   0x000055555555588b &lt;+91&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x0000555555555890 &lt;+96&gt;:    jmp    0x555555555846 &lt;phase_5+22&gt;
   0x0000555555555892 &lt;+98&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x0000555555555897 &lt;+103&gt;:   jmp    0x555555555885 &lt;phase_5+85&gt;
End of assembler dump.
<span class="o">(</span>gdb<span class="o">)</span> 
</code></pre>
</div>

<div class="codehilite">
<pre><span></span><code>...
   0x000055555555583c &lt;+12&gt;:    call   0x555555555b10 &lt;string_length&gt;
   0x0000555555555841 &lt;+17&gt;:    cmp    <span class="nv">$0</span>x6,%eax
   0x0000555555555844 &lt;+20&gt;:    jne    0x55555555588b &lt;phase_5+91&gt;
...
   0x000055555555588b &lt;+91&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
...
</code></pre>
</div>

<p>First things first, these instructions check to make sure the passed string is of length 6, otherwise <code>explode_bomb</code> is called.</p>

<p>We can also see a similar pattern compared to Phase 2, where we had a loop:</p>

<ul>
<li>The looping part:
<ul>
<li><code>mov $0x0,%eax</code> - Initialise <code>%eax</code> and set it to 0 (our counter/iterator)</li>
<li><code>movzbl (%rbx,%rax,1),%edx</code> - Access <code>%rbx + 1 * %rax</code> and store it in <code>%edx</code></li>
<li><code>and $0xf,%edx</code> - Take the least significant 4 bits of the byte.</li>
<li><code>movzbl (%rcx,%rdx,1),%edx</code> - Use the 4 bits as an index into another array and load the corresponding byte into <code>%edx</code></li>
<li><code>mov %dl,0x9(%rsp,%rax,1)</code> - Store the transformed byte into a buffer on the stack</li>
<li><code>add $0x1,%rax</code> - Increment <code>%rax</code></li>
<li><code>cmp    $0x6,%rax</code> - If the index is not yet 6, loop again</li>
</ul></li>
<li><code>movb $0x0,0xf(%rsp)</code> - Null-terminate the transformed string</li>
<li><code>lea 0x9(%rsp),%rdi</code> and <code>lea 0x1943(%rip),%rsi</code> </li>
<li><code>all 0x555555555b31 &lt;strings_not_equal&gt;</code> check if the two strings loaded up just before this are equal or not.</li>
</ul>

<p>We can check the reference string we need, which <code>gdb</code> has marked as <code># 0x5555555571bf</code>, and the lookup table marked as <code># 0x5555555571f0 &lt;array.0&gt;</code></p>

<div class="codehilite">
<pre><span></span><code><span class="o">(</span>gdb<span class="o">)</span> x/s 0x5555555571bf
0x5555555571bf: <span class="s2">&quot;bruins&quot;</span>
<span class="o">(</span>gdb<span class="o">)</span> x/s 0x5555555571f0
0x5555555571f0 &lt;array.0&gt;:       <span class="s2">&quot;maduiersnfotvbylSo you think you can stop the bomb with ctrl-c, do you?&quot;</span>
<span class="o">(</span>gdb<span class="o">)</span> 
</code></pre>
</div>

<p>To summarize the transformation process:</p>

<ul>
<li>The function takes each byte of the string</li>
<li>It keeps only the least significant 4 bits of each byte</li>
<li>It uses these 4 bits as an index into the lookup table (<code>array.0</code>)</li>
<li>The value from the array is then stored in a buffer</li>
</ul>

<p>Here's how the transformation process can be reversed for each character in "bruins":
1. Find the index of <code>b</code> in the lookup table (in our case, it is 13 since we index starting 0)
2. Calculate binary representation of this index (in our case 13 can be written as 1101 in binary)
3. Find ASCII character whose least significant 4 bits match (in our case, <code>m</code> has binary representation <code>01101101</code>)</p>

<p>Repeat for all 6 characters</p>

<p><em>Hint: Using an <a rel="noopener" target="_blank" href="http://sticksandstones.kstrom.com/appen.html">ASCII - Binary Table</a> can save you time.</em> </p>

<p>Thus, we can have the following transformation:</p>

<pre><code>b -&gt; m
r -&gt; f 
u -&gt; c
i -&gt; d
n -&gt; h
s -&gt; g
</code></pre>

<p>Let us try out this answer:</p>

<div class="codehilite">
<pre><span></span><code>...
That<span class="err">&#39;</span>s number <span class="m">2</span>.  Keep going!
Halfway there!
So you got that one.  Try this one.
mfcdhg

Breakpoint <span class="m">1</span>, 0x0000555555555830 <span class="k">in</span> phase_5 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> <span class="k">continue</span>
Continuing.
Good work!  On to the next...
</code></pre>
</div>

<p>Awesome!</p>

<h2>Phase 6</h2>

<div class="codehilite">
<pre><span></span><code>Good work!  On to the next...
<span class="nb">test</span> string

Breakpoint <span class="m">1</span>, 0x0000555555555899 <span class="k">in</span> phase_6 <span class="o">()</span>
<span class="o">(</span>gdb<span class="o">)</span> disas phase_6
Dump of assembler code <span class="k">for</span> <span class="k">function</span> phase_6:
<span class="o">=</span>&gt; 0x0000555555555899 &lt;+0&gt;:     endbr64 
   0x000055555555589d &lt;+4&gt;:     push   %r15
   0x000055555555589f &lt;+6&gt;:     push   %r14
   0x00005555555558a1 &lt;+8&gt;:     push   %r13
   0x00005555555558a3 &lt;+10&gt;:    push   %r12
   0x00005555555558a5 &lt;+12&gt;:    push   %rbp
   0x00005555555558a6 &lt;+13&gt;:    push   %rbx
   0x00005555555558a7 &lt;+14&gt;:    sub    <span class="nv">$0</span>x68,%rsp
   0x00005555555558ab &lt;+18&gt;:    lea    0x40<span class="o">(</span>%rsp<span class="o">)</span>,%rax
   0x00005555555558b0 &lt;+23&gt;:    mov    %rax,%r14
   0x00005555555558b3 &lt;+26&gt;:    mov    %rax,0x8<span class="o">(</span>%rsp<span class="o">)</span>
   0x00005555555558b8 &lt;+31&gt;:    mov    %rax,%rsi
   0x00005555555558bb &lt;+34&gt;:    call   0x555555555d97 &lt;read_six_numbers&gt;
   0x00005555555558c0 &lt;+39&gt;:    mov    %r14,%r12
   0x00005555555558c3 &lt;+42&gt;:    mov    <span class="nv">$0</span>x1,%r15d
   0x00005555555558c9 &lt;+48&gt;:    mov    %r14,%r13
   0x00005555555558cc &lt;+51&gt;:    jmp    0x555555555997 &lt;phase_6+254&gt;
   0x00005555555558d1 &lt;+56&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x00005555555558d6 &lt;+61&gt;:    jmp    0x5555555559a9 &lt;phase_6+272&gt;
   0x00005555555558db &lt;+66&gt;:    add    <span class="nv">$0</span>x1,%rbx
   0x00005555555558df &lt;+70&gt;:    cmp    <span class="nv">$0</span>x5,%ebx
   0x00005555555558e2 &lt;+73&gt;:    jg     0x55555555598f &lt;phase_6+246&gt;
   0x00005555555558e8 &lt;+79&gt;:    mov    0x0<span class="o">(</span>%r13,%rbx,4<span class="o">)</span>,%eax
   0x00005555555558ed &lt;+84&gt;:    cmp    %eax,0x0<span class="o">(</span>%rbp<span class="o">)</span>
   0x00005555555558f0 &lt;+87&gt;:    jne    0x5555555558db &lt;phase_6+66&gt;
   0x00005555555558f2 &lt;+89&gt;:    call   0x555555555d4a &lt;explode_bomb&gt;
   0x00005555555558f7 &lt;+94&gt;:    jmp    0x5555555558db &lt;phase_6+66&gt;
   0x00005555555558f9 &lt;+96&gt;:    mov    0x8<span class="o">(</span>%rsp<span class="o">)</span>,%rdx
   0x00005555555558fe &lt;+101&gt;:   add    <span class="nv">$0</span>x18,%rdx
   0x0000555555555902 &lt;+105&gt;:   mov    <span class="nv">$0</span>x7,%ecx
   0x0000555555555907 &lt;+110&gt;:   mov    %ecx,%eax
   0x0000555555555909 &lt;+112&gt;:   sub    <span class="o">(</span>%r12<span class="o">)</span>,%eax
   0x000055555555590d &lt;+116&gt;:   mov    %eax,<span class="o">(</span>%r12<span class="o">)</span>
   0x0000555555555911 &lt;+120&gt;:   add    <span class="nv">$0</span>x4,%r12
   0x0000555555555915 &lt;+124&gt;:   cmp    %r12,%rdx
   0x0000555555555918 &lt;+127&gt;:   jne    0x555555555907 &lt;phase_6+110&gt;
   0x000055555555591a &lt;+129&gt;:   mov    <span class="nv">$0</span>x0,%esi
   0x000055555555591f &lt;+134&gt;:   mov    0x40<span class="o">(</span>%rsp,%rsi,4<span class="o">)</span>,%ecx
   0x0000555555555923 &lt;+138&gt;:   mov    <span class="nv">$0</span>x1,%eax
   0x0000555555555928 &lt;+143&gt;:   lea    0x3d01<span class="o">(</span>%rip<span class="o">)</span>,%rdx        <span class="c1"># 0x555555559630 &lt;node1&gt;</span>
--Type &lt;RET&gt; <span class="k">for</span> more, q to quit, c to <span class="k">continue</span> without paging--
   0x000055555555592f &lt;+150&gt;:   cmp    <span class="nv">$0</span>x1,%ecx
   0x0000555555555932 &lt;+153&gt;:   jle    0x55555555593f &lt;phase_6+166&gt;
   0x0000555555555934 &lt;+155&gt;:   mov    0x8<span class="o">(</span>%rdx<span class="o">)</span>,%rdx
   0x0000555555555938 &lt;+159&gt;:   add    <span class="nv">$0</span>x1,%eax
   0x000055555555593b &lt;+162&gt;:   cmp    %ecx,%eax
   0x000055555555593d &lt;+164&gt;:   jne    0x555555555934 &lt;phase_6+155&gt;
   0x000055555555593f &lt;+166&gt;:   mov    %rdx,0x10<span class="o">(</span>%rsp,%rsi,8<span class="o">)</span>
   0x0000555555555944 &lt;+171&gt;:   add    <span class="nv">$0</span>x1,%rsi
   0x0000555555555948 &lt;+175&gt;:   cmp    <span class="nv">$0</span>x6,%rsi
   0x000055555555594c &lt;+179&gt;:   jne    0x55555555591f &lt;phase_6+134&gt;
   0x000055555555594e &lt;+181&gt;:   mov    0x10<span class="o">(</span>%rsp<span class="o">)</span>,%rbx
   0x0000555555555953 &lt;+186&gt;:   mov    0x18<span class="o">(</span>%rsp<span class="o">)</span>,%rax
   0x0000555555555958 &lt;+191&gt;:   mov    %rax,0x8<span class="o">(</span>%rbx<span class="o">)</span>
   0x000055555555595c &lt;+195&gt;:   mov    0x20<span class="o">(</span>%rsp<span class="o">)</span>,%rdx
   0x0000555555555961 &lt;+200&gt;:   mov    %rdx,0x8<span class="o">(</span>%rax<span class="o">)</span>
   0x0000555555555965 &lt;+204&gt;:   mov    0x28<span class="o">(</span>%rsp<span class="o">)</span>,%rax
   0x000055555555596a &lt;+209&gt;:   mov    %rax,0x8<span class="o">(</span>%rdx<span class="o">)</span>
   0x000055555555596e &lt;+213&gt;:   mov    0x30<span class="o">(</span>%rsp<span class="o">)</span>,%rdx
   0x0000555555555973 &lt;+218&gt;:   mov    %rdx,0x8<span class="o">(</span>%rax<span class="o">)</span>
   0x0000555555555977 &lt;+222&gt;:   mov    0x38<span class="o">(</span>%rsp<span class="o">)</span>,%rax
   0x000055555555597c &lt;+227&gt;:   mov    %rax,0x8<span class="o">(</span>%rdx<span class="o">)</span>
   0x0000555555555980 &lt;+231&gt;:   movq   <span class="nv">$0</span>x0,0x8<span class="o">(</span>%rax<span class="o">)</span>
   0x0000555555555988 &lt;+239&gt;:   mov    <span class="nv">$0</span>x5,%ebp
   0x000055555555598d &lt;+244&gt;:   jmp    0x5555555559c4 &lt;phase_6+299&gt;
   0x000055555555598f &lt;+246&gt;:   add    <span class="nv">$0</span>x1,%r15
   0x0000555555555993 &lt;+250&gt;:   add    <span class="nv">$0</span>x4,%r14
   0x0000555555555997 &lt;+254&gt;:   mov    %r14,%rbp
   0x000055555555599a &lt;+257&gt;:   mov    <span class="o">(</span>%r14<span class="o">)</span>,%eax
   0x000055555555599d &lt;+260&gt;:   sub    <span class="nv">$0</span>x1,%eax
   0x00005555555559a0 &lt;+263&gt;:   cmp    <span class="nv">$0</span>x5,%eax
   0x00005555555559a3 &lt;+266&gt;:   ja     0x5555555558d1 &lt;phase_6+56&gt;
   0x00005555555559a9 &lt;+272&gt;:   cmp    <span class="nv">$0</span>x5,%r15d
   0x00005555555559ad &lt;+276&gt;:   jg     0x5555555558f9 &lt;phase_6+96&gt;
   0x00005555555559b3 &lt;+282&gt;:   mov    %r15,%rbx
   0x00005555555559b6 &lt;+285&gt;:   jmp    0x5555555558e8 &lt;phase_6+79&gt;
   0x00005555555559bb &lt;+290&gt;:   mov    0x8<span class="o">(</span>%rbx<span class="o">)</span>,%rbx
   0x00005555555559bf &lt;+294&gt;:   sub    <span class="nv">$0</span>x1,%ebp
   0x00005555555559c2 &lt;+297&gt;:   je     0x5555555559d5 &lt;phase_6+316&gt;
   0x00005555555559c4 &lt;+299&gt;:   mov    0x8<span class="o">(</span>%rbx<span class="o">)</span>,%rax
   0x00005555555559c8 &lt;+303&gt;:   mov    <span class="o">(</span>%rax<span class="o">)</span>,%eax
   0x00005555555559ca &lt;+305&gt;:   cmp    %eax,<span class="o">(</span>%rbx<span class="o">)</span>
--Type &lt;RET&gt; <span class="k">for</span> more, q to quit, c to <span class="k">continue</span> without paging--
   0x00005555555559cc &lt;+307&gt;:   jge    0x5555555559bb &lt;phase_6+290&gt;
   0x00005555555559ce &lt;+309&gt;:   call   0x555555555d4a &lt;explode_bomb&gt;
   0x00005555555559d3 &lt;+314&gt;:   jmp    0x5555555559bb &lt;phase_6+290&gt;
   0x00005555555559d5 &lt;+316&gt;:   add    <span class="nv">$0</span>x68,%rsp
   0x00005555555559d9 &lt;+320&gt;:   pop    %rbx
   0x00005555555559da &lt;+321&gt;:   pop    %rbp
   0x00005555555559db &lt;+322&gt;:   pop    %r12
   0x00005555555559dd &lt;+324&gt;:   pop    %r13
   0x00005555555559df &lt;+326&gt;:   pop    %r14
   0x00005555555559e1 &lt;+328&gt;:   pop    %r15
   0x00005555555559e3 &lt;+330&gt;:   ret    
End of assembler dump.
<span class="o">(</span>gdb<span class="o">)</span> 
</code></pre>
</div>

<p>Again, we see the familiar <code>read_six_digits</code> function.</p>

<p>Let us analyse this function in chunks:
   <div class="codehilite">
   <pre><span></span><code>0x00005555555558bb &lt;+34&gt;:    call   0x555555555d97 &lt;read<em>six</em>numbers&gt;
   0x00005555555558c0 &lt;+39&gt;:    mov    %r14,%r12
   0x00005555555558c3 &lt;+42&gt;:    mov    <span class="nv">$0</span>x1,%r15d
   0x00005555555558c9 &lt;+48&gt;:    mov    %r14,%r13
   0x00005555555558cc &lt;+51&gt;:    jmp    0x555555555997 &lt;phase_6+254&gt;
   </code></pre>
   </div></p>

<ol>
<li>Read six numbers</li>
<li>Initialise Registers:
2.1. <code>mov %r14,%r12</code>: <code>%r14</code> should be pointing to the location of the stack where the numbers were read into. This address is copied onto <code>%r12</code>
2.2. <code>mov $0x1,%r15d</code>: The value <code>1</code> is moved into <code>%r15</code> register (probably acting like a counter)
2.3. <code>mov %r14,%r13</code>: The value is also copied to <code>%r13</code></li>
<li><p>Jump to start of loop:</p>

<div class="codehilite">
<pre><span></span><code>0x0000555555555997 &lt;+254&gt;:   mov    %r14,%rbp
0x000055555555599a &lt;+257&gt;:   mov    <span class="o">(</span>%r14<span class="o">)</span>,%eax
0x000055555555599d &lt;+260&gt;:   sub    <span class="nv">$0</span>x1,%eax
0x00005555555559a0 &lt;+263&gt;:   cmp    <span class="nv">$0</span>x5,%eax
0x00005555555559a3 &lt;+266&gt;:   ja     0x5555555558d1 &lt;phase_6+56&gt;
</code></pre>
</div></li>
<li><p>Initialise register and point to first number in sequence</p></li>
<li>Adjust number(s):
2.1. <code>mov (%r14),%eax</code> -> load the current number in the sequence
2.2. <code>sub $0x1,%eax</code> -> decrement number by 1</li>
<li>Validation
3.1. <code>cmp $0x5,%eax</code>: This compares the adjusted value in <code>%eax</code> with 5.
3.2. <code>ja 0x5555555558d1 &lt;phase_6+56&gt;</code>: jump if given value is &gt; 5 or &lt; 0</li>
</ol>

<p>=&gt; All numbers should be between 1 and 6.
   <div class="codehilite">
   <pre><span></span><code>0x00005555555559a9 &lt;+272&gt;:   cmp    <span class="nv">$0</span>x5,%r15d
   0x00005555555559ad &lt;+276&gt;:   jg     0x5555555558f9 &lt;phase_6+96&gt;
   </code></pre>
   </div></p>

<p>This checks if the value stored in <code>%r15</code> is &gt; 5, if it is then it jumps somewhere else. This validates our assumption that <code>%r15</code> is acting as a counter.
   <div class="codehilite">
   <pre><span></span><code>0x00005555555559b3 &lt;+282&gt;:   mov    %r15,%rbx
   0x00005555555559b6 &lt;+285&gt;:   jmp    0x5555555558e8 &lt;phase_6+79&gt;
   </code></pre>
   </div></p>

<p>Let us jump to +79
   <div class="codehilite">
   <pre><span></span><code>0x00005555555558e8 &lt;+79&gt;:    mov    0x0<span class="o">(</span>%r13,%rbx,4<span class="o">)</span>,%eax
   0x00005555555558ed &lt;+84&gt;:    cmp    %eax,0x0<span class="o">(</span>%rbp<span class="o">)</span>
   0x00005555555558f0 &lt;+87&gt;:    jne    0x5555555558db &lt;phase<em>6+66&gt;
   0x00005555555558f2 &lt;+89&gt;:    call   0x555555555d4a &lt;explode</em>bomb&gt;
   0x00005555555558f7 &lt;+94&gt;:    jmp    0x5555555558db &lt;phase_6+66&gt;
   </code></pre>
   </div></p>

<p>This section deals with checking if all the numbers in the sequence are unique or not. Thus, we need to ensure out 6 digits are unique
   <div class="codehilite">
   <pre><span></span><code>0x00005555555558db &lt;+66&gt;:    add    <span class="nv">$0</span>x1,%rbx // Increments by <span class="m">1</span>
   0x00005555555558df &lt;+70&gt;:    cmp    <span class="nv">$0</span>x5,%ebx 
   0x00005555555558e2 &lt;+73&gt;:    jg     0x55555555598f &lt;phase<em>6+246&gt; // Jump <span class="k">if</span> &gt; <span class="m">5</span> <span class="o">(</span>Loop iterations are <span class="nb">complete</span><span class="o">)</span>
   0x00005555555558e8 &lt;+79&gt;:    mov    0x0<span class="o">(</span>%r13,%rbx,4<span class="o">)</span>,%eax 
   0x00005555555558ed &lt;+84&gt;:    cmp    %eax,0x0<span class="o">(</span>%rbp<span class="o">)</span>
   0x00005555555558f0 &lt;+87&gt;:    jne    0x5555555558db &lt;phase</em>6+66&gt; // Again, check <span class="k">if</span> the number being seen is unique
   </code></pre>
   </div></p>

<p>Now we know that the numbers are unique, between 1-6 (inclusive).</p>

<p>After stepping through the instructions, we can also see that the numbers are being transformed:
* By subtracting it from 7 (mov $0x7,%ecx followed by sub (%r12),%eax)
* This effectively maps the numbers as follows: 1 to 6, 2 to 5, 3 to 4, 4 to 3, 5 to 2, and 6 to 1.</p>

<p>Let us try to figure out what <code>0x0000555555555928 &lt;+143&gt;:   lea    0x3d01(%rip),%rdx        # 0x555555559630 &lt;node1&gt;</code> is:</p>

<div class="codehilite">
<pre><span></span><code><span class="o">(</span>gdb<span class="o">)</span> x/30wx 0x555555559630
0x555555559630 &lt;node1&gt;: 0x000000d9      0x00000001      0x55559640      0x00005555
0x555555559640 &lt;node2&gt;: 0x000003ab      0x00000002      0x55559650      0x00005555
0x555555559650 &lt;node3&gt;: 0x0000014f      0x00000003      0x55559660      0x00005555
0x555555559660 &lt;node4&gt;: 0x000000a1      0x00000004      0x55559670      0x00005555
0x555555559670 &lt;node5&gt;: 0x000001b3      0x00000005      0x55559120      0x00005555
0x555555559680 &lt;host_table&gt;:    0x555573f5      0x00005555      0x5555740f      0x00005555
0x555555559690 &lt;host_table+16&gt;: 0x55557429      0x00005555      0x00000000      0x00000000
0x5555555596a0 &lt;host_table+32&gt;: 0x00000000      0x00000000
<span class="o">(</span>gdb<span class="o">)</span> x/30wx 0x555555559120
0x555555559120 &lt;node6&gt;: 0x000002da      0x00000006      0x00000000      0x00000000
0x555555559130: 0x00000000      0x00000000      0x00000000      0x00000000
0x555555559140 &lt;userid&gt;:        0x61767861      0x38383535      0x00000000      0x00000000
0x555555559150 &lt;userid+16&gt;:     0x00000000      0x00000000      0x00000000      0x00000000
0x555555559160 &lt;userid+32&gt;:     0x00000000      0x00000000      0x00000000      0x00000000
0x555555559170 &lt;userid+48&gt;:     0x00000000      0x00000000      0x00000000      0x00000000
0x555555559180 &lt;userid+64&gt;:     0x00000000      0x00000000      0x00000000      0x00000000
0x555555559190 &lt;userid+80&gt;:     0x00000000      0x00000000
<span class="o">(</span>gdb<span class="o">)</span> 
</code></pre>
</div>

<p>It appears that this is a linked list. With roughly the following structure:</p>

<div class="codehilite">
<pre><span></span><code><span class="k">struct</span><span class="w"> </span><span class="nc">node</span><span class="w"> </span><span class="p">{</span><span class="w"></span>
<span class="w">    </span><span class="kt">int</span><span class="w"> </span><span class="n">value</span><span class="p">;</span><span class="w"></span>
<span class="w">    </span><span class="kt">int</span><span class="w"> </span><span class="n">index</span><span class="p">;</span><span class="w"></span>
<span class="w">    </span><span class="k">struct</span><span class="w"> </span><span class="nc">node</span><span class="w"> </span><span class="o">*</span><span class="n">next</span><span class="p">;</span><span class="w"></span>
<span class="p">};</span><span class="w"></span>
</code></pre>
</div>

<p>Let us convert the values into decimal:</p>

<pre><code>0x000000d9 -&gt; 217
0x000003ab -&gt; 939
0x0000014f -&gt; 335
0x000000a1 -&gt; 161
0x000001b3 -&gt; 435
0x000002da -&gt; 730
</code></pre>

<p><strong>Missing Notes</strong></p>

<p>To re-arrange this linked list in descending order, we would arrange it as follows:</p>

<pre><code>Node 2 -&gt; Node 6 -&gt; Node 5 -&gt; Node 3 -&gt; Node 1 -&gt; Node 4
</code></pre>

<p>Since we also need to apply the transformation: <code>7 - x</code>:</p>

<pre><code>(7-2) -&gt; (7-6) -&gt; ... -&gt; (7-4) 
</code></pre>

<p>Final answer: <code>5 1 2 4 6 3</code></p>

<p>Let us try the answer:</p>

<pre><code>...
That's number 2.  Keep going!
Halfway there!
So you got that one.  Try this one.
Good work!  On to the next...
5 1 2 4 6 3

Breakpoint 1, 0x0000555555555899 in phase_6 ()
(gdb) continue
Continuing.
Congratulations! You've defused the bomb!
Your instructor has been notified and will verify your solution.
[Inferior 1 (process 1754) exited normally]
</code></pre>

<p>But, what about the secret phase?</p>

	<blockquote>If you have scrolled this far, consider subscribing to my mailing list <a href="https://listmonk.navan.dev/subscription/form">here.</a> You can subscribe to either a specific type of post you are interested in, or subscribe to everything with the "Everything" list.</blockquote>
	<script data-isso="//comments.navan.dev/"
        src="//comments.navan.dev/js/embed.min.js"></script>
	<section id="isso-thread">
	    <noscript>Javascript needs to be activated to view comments.</noscript>
	</section>
</main>


<script src="assets/manup.min.js"></script>
<script src="/pwabuilder-sw-register.js"></script>    
</body>
</html>