Once you have received your bomb from the bomb daemon,
save it in a secure directory. Your job is to defuse the bomb.
You can use many tools to help you with this; please look at the
Hints section for some tips and ideas. The best way is to use your
favorite debugger to step through the disassembled binary.
Each time your bomb explodes it notifies the staff, and you lose
1/4 point (up to a max of 10 points) in the final score for the lab.
So there are consequences to exploding the bomb. You must be careful!
Each phase is worth 10 points, for a total of 60 points.
The phases get progressively harder to defuse, but the expertise you
gain as you move from phase to phase should offset this
difficulty. However, the last phase will challenge even the best
students, so please don't wait until the last minute to start.
The bomb ignores blank input lines. If you run the bomb with a
command line argument such as psol.txt, it will read the input lines
from psol.txt until it reaches EOF, and then switch over to
stdin. In a moment of weakness, Dr. Evil added this feature so you
don't have to keep retyping the solutions to phases you have already
defused.
To avoid accidently detonating the bomb, you will need to learn how to
single-step through the assembly code and how to set breakpoints. You
will also need to learn how to inspect both the registers and the
memory states. One of the nice side-effects of doing the lab is that
you will get very good at using a debugger. This is a crucial skill
that will pay big dividends the rest of your career.