我正在尝试将CMU的二元炸弹作为一个独立项目来学习一些x86组装和逆向工程. (这不是与班级相关的自动评分版本.)
我从http://csapp.cs.cmu.edu/public/labs.html下载了bomb.tar.
来自CMU的实验室描述:
A “binary bomb” is a program provided to students as an object code
file. When run,it prompts the user to type in 6 different strings. If
any of these is incorrect,the bomb “explodes,” printing an error
message and logging the event on a grading server. Students must
“defuse” their own unique bomb by disassembling and reverse
engineering the program to determine what the 6 strings should be. The
lab teaches students to understand assembly language,and also forces
them to learn how to use a debugger. It’s also great fun. A legendary
lab among the CMU undergrads.Here’s a 07001 that you can try out for yourself. The
feature that notifies the grading server has been disabled,so feel
free to explode this bomb with impunity.
将其保存到适当的文件夹后,我在终端中运行了此命令:
tar xvf bomb.tar
>它确实提取了一个名为炸弹的文件(没有文件扩展名),但我认为它也会给我炸弹,这也有助于参考.
>我无法运行“炸弹”.这是我尝试过的:
bomb
bomb: command not found
./bomb
bash: ./bomb: No such file or directory
>虽然我意识到解决它需要在gdb中单步执行它,但我甚至无法在BASH中运行它并将自己弄错了答案!一点点帮助太棒了.
具体来说,以下命令有帮助.
sudo apt-get install lib32z1 lib32ncurses5 lib32bz2-1.0