--------------- Lab01: warm-up1 --------------- This is a warm-up lab that prepares you with the basic techniques used throughout this course. It is also a good chance to familiarize yourself with our submission and scoring system. In this problem, your task is to defuse the bomb and get the flag. The binary _bomb_, is an executable that consists of multiple _phases_. Each phase expects you to enter a particular string (i.e., password) on stdin. If you enter the expected phrase, then the bomb is defused. Otherwise, it explodes, and you get _five_ points **deducted**. A thorough understanding of how each phase works at the binary level is required to solve this challenge without losing your points. Note: you must maintain the Internet connection when you are solving this problem as it will update your progress (i.e., bomb defused/exploded) to the submission site, so be careful and not let the bomb explode! But be **creative** yet **careful** not to lose any points! * Problems + [level 00] tut01-crackme [20 points] + [level 01] bomb101-strcmp [20 points] + [level 02] bomb102-funcall [20 points] + [level 03] bomb103-password [20 points] + [level 04] bomb104-quick [20 points] + [level 05] bomb105-jump [20 points] + [level 06] bomb106-binary [20 points] + [level 07] bomb107-array [20 points] + [level 08] bomb108-list [20 points] + [level 09] bomb109-secrete [20 points] + [level 10] bomb110-raspberry [20 points] - [5 points] whenever we notice that you explode a bomb * Refs https://sourceware.org/gdb/onlinedocs/gdb/ http://ref.x86asm.net/geek64.html (if you need to refresh yourself about the low-level programming) https://www.cs.cmu.edu/~213/lectures/05-machine-basics.pdf (looking for a short gdb tutorial) https://beej.us/guide/bggdb/