Hi i need help to figure out this part of the assembly to defuse the bomb. I cant figure out what are the six numbers .. please help
Code:
Dump of assembler code for function phase_2:
0x080489ab <phase_2+0>: push %ebp
0x080489ac <phase_2+1>: mov %esp,%ebp
0x080489ae <phase_2+3>: push %ebx
0x080489af <phase_2+4>: sub $0x34,%esp
0x080489b2 <phase_2+7>: lea -0x1c(%ebp),%eax
0x080489b5 <phase_2+10>: mov %eax,0x4(%esp)
0x080489b9 <phase_2+14>: mov 0x8(%ebp),%eax
0x080489bc <phase_2+17>: mov %eax,(%esp)
0x080489bf <phase_2+20>: call 0x8048d82 <read_six_numbers>
0x080489c4 <phase_2+25>: cmpl $0x0,-0x1c(%ebp)
0x080489c8 <phase_2+29>: jne 0x80489d0 <phase_2+37>
0x080489ca <phase_2+31>: cmpl $0x1,-0x18(%ebp)
0x080489ce <phase_2+35>: je 0x80489d5 <phase_2+42>
0x080489d0 <phase_2+37>: call 0x8048d58 <explode_bomb>
0x080489d5 <phase_2+42>: lea -0x14(%ebp),%ebx
0x080489d8 <phase_2+45>: mov -0x8(%ebx),%eax
0x080489db <phase_2+48>: add -0x4(%ebx),%eax
0x080489de <phase_2+51>: cmp %eax,(%ebx)
0x080489e0 <phase_2+53>: je 0x80489e7 <phase_2+60>
0x080489e2 <phase_2+55>: call 0x8048d58 <explode_bomb>
0x080489e7 <phase_2+60>: add $0x4,%ebx
0x080489ea <phase_2+63>: lea -0x4(%ebp),%eax
0x080489ed <phase_2+66>: cmp %eax,%ebx
0x080489ef <phase_2+68>: jne 0x80489d8 <phase_2+45>
0x080489f1 <phase_2+70>: add $0x34,%esp
0x080489f4 <phase_2+73>: pop %ebx
0x080489f5 <phase_2+74>: pop %ebp
0x080489f6 <phase_2+75>: ret
End of assembler dump.
disas read_six_numbers
Dump of assembler code for function read_six_numbers:
0x08048d82 <read_six_numbers+0>: push %ebp
0x08048d83 <read_six_numbers+1>: mov %esp,%ebp
0x08048d85 <read_six_numbers+3>: sub $0x28,%esp
0x08048d88 <read_six_numbers+6>: mov 0xc(%ebp),%edx
0x08048d8b <read_six_numbers+9>: lea 0x14(%edx),%eax
0x08048d8e <read_six_numbers+12>: mov %eax,0x1c(%esp)
0x08048d92 <read_six_numbers+16>: lea 0x10(%edx),%eax
0x08048d95 <read_six_numbers+19>: mov %eax,0x18(%esp)
0x08048d99 <read_six_numbers+23>: lea 0xc(%edx),%eax
0x08048d9c <read_six_numbers+26>: mov %eax,0x14(%esp)
0x08048da0 <read_six_numbers+30>: lea 0x8(%edx),%eax
0x08048da3 <read_six_numbers+33>: mov %eax,0x10(%esp)
0x08048da7 <read_six_numbers+37>: lea 0x4(%edx),%eax
0x08048daa <read_six_numbers+40>: mov %eax,0xc(%esp)
0x08048dae <read_six_numbers+44>: mov %edx,0x8(%esp)
0x08048db2 <read_six_numbers+48>: movl $0x80492dc,0x4(%esp)
0x08048dba <read_six_numbers+56>: mov 0x8(%ebp),%eax
0x08048dbd <read_six_numbers+59>: mov %eax,(%esp)
0x08048dc0 <read_six_numbers+62>: call 0x8048530 <sscanf@plt>
0x08048dc5 <read_six_numbers+67>: cmp $0x5,%eax
0x08048dc8 <read_six_numbers+70>: jg 0x8048dcf <read_six_numbers+77>
0x08048dca <read_six_numbers+72>: call 0x8048d58 <explode_bomb>
0x08048dcf <read_six_numbers+77>: leave
0x08048dd0 <read_six_numbers+78>: ret
End of assembler dump.