我正在尝试将CMU的二元炸d作为一个独立项目来学习一些x86组装和逆向工程. (这不是与班级相关的自动评分版本.)
我从http://csapp.cs.cmu.edu/public/labs.html下载了bomb.tar.
来自CMU的实验室描述:
A “binary bomb” is a program provIDed to students as an object code
file. When run,it prompts the user to type in 6 different strings. If
any of these is incorrect,the bomb “explodes,” printing an error
message and logging the event on a grading server. Students must
“defuse” their own unique bomb by disassembling and reverse
engineering the program to determine what the 6 strings should be. The
lab teaches students to understand assembly language,and also forces
them to learn how to use a deBUGger. It’s also great fun. A legendary
lab among the CMU undergrads.Here’s a 07001 that you can try out for yourself. The
feature that notifIEs the grading server has been Disabled,so feel
free to explode this bomb with impunity.
将其保存到适当的文件夹后,我在终端中运行了此命令:
tar xvf bomb.tar
>它确实提取了一个名为炸d的文件(没有文件扩展名),但我认为它也会给我炸d,这也有助于参考.
>我无法运行“炸d”.这是我尝试过的:
bombbomb: command not found./bombbash: ./bomb: No such file or directory
>虽然我意识到解决它需要在gdb中单步执行它,但我甚至无法在BASH中运行它并将自己弄错了答案!一点点帮助太棒了.
最佳答案正如其他答案所暗示的那样,这似乎是cpu架构兼容性问题.通过安装位于AskUbuntu.com How to run 32-bit programs on a 64-bit system 的软件包,我能够在Ubuntu 15.04 64位上解决这个问题.具体来说,以下命令有帮助.
sudo apt-get install lib32z1 lib32ncurses5 lib32bz2-1.0
总结 以上是内存溢出为你收集整理的如何在Ubuntu Linux中执行CMU二进制炸d?全部内容,希望文章能够帮你解决如何在Ubuntu Linux中执行CMU二进制炸d?所遇到的程序开发问题。
如果觉得内存溢出网站内容还不错,欢迎将内存溢出网站推荐给程序员好友。
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)