$ cd ~/cs31/inclass $ cp -r ~mauskop/public/cs31/week08/ .
Run the mystery binary a few times and see what it is doing:
./mystery
There is really not a lot of information to guess the right input, and this executable was not compiled with -g so there is no C code when we run it in gdb. So let's see if we can examine the assembly code to figure out what to enter.
The strings command shows us all the strings that appear in the binary executable. objdump -d disassembles the executable and shows us all the machine instructions.
$ ddd ./mystery
(gdb) x/s base_addr_of_string