Wrox Programmer Forums

Need to download code?

View our list of code downloads.

Go Back   Wrox Programmer Forums > Visual Basic > VB 6 Visual Basic 6 > Pro VB 6
Password Reminder
Register
| FAQ | Members List | Calendar | Search | Today's Posts | Mark Forums Read
Pro VB 6 For advanced Visual Basic coders working in version 6 (not .NET). Beginning-level questions will be redirected to other forums, including Beginning VB 6.
Welcome to the p2p.wrox.com Forums.

You are currently viewing the Pro VB 6 section of the Wrox Programmer to Programmer discussions. This is a community of tens of thousands of software programmers and website developers including Wrox book authors and readers. As a guest, you can read any forum posting. By joining today you can post your own programming questions, respond to other developers’ questions, and eliminate the ads that are displayed to guests. Registration is fast, simple and absolutely free .
DRM-free e-books 300x50
Reply
 
Thread Tools Search this Thread Display Modes
  #1 (permalink)  
Old May 5th, 2006, 02:26 AM
Registered User
 
Join Date: Apr 2006
Location: Kendal, , United Kingdom.
Posts: 1
Thanks: 0
Thanked 0 Times in 0 Posts
Default reverse engineering?

Hi guys,

I have a problem with some legacy software I am working on. Existing there is an .exe which calls a form in a .dll (passing a reference to itself as an argument), the .dll then calls back to the .exe. My problem is that I am writing a replacement for the .exe... I can call and run the form on the .dll OK, but I do not know the names of the functions (or arguments etc) in the original .exe that the dll uses to call back. The exe does not show any interface using VB6 object inspector. I do have a rough idea of what the effects of the callbacks should be. The original documentation and source for both the exe and dll are lost. Any pointers?

Cheers, Andy

Regards, Andy
Reply With Quote
  #2 (permalink)  
Old May 5th, 2006, 10:48 AM
Friend of Wrox
 
Join Date: Nov 2004
Location: Port Orchard, WA, USA.
Posts: 1,621
Thanks: 1
Thanked 3 Times in 3 Posts
Default

You could try to tap into the Windows Messaging system, to try to find out what the system messages were that were used to invoke the call(s). (Tough go, that one though.)
There are tools available for this. Once you start logging messages though, you see a message for every action—mouse moves, clicks, programs initiating actions, ad ininitim.
Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off
Trackbacks are Off
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
how to protect C# exe from reverse engineering? testmail_123 C# 3 July 27th, 2012 11:16 PM
Reverse Engineering abdul_owiusa General .NET 0 July 18th, 2006 10:22 AM
Reverse engineering in .NET 2.0 vinit C# 0 June 27th, 2006 04:52 AM
Reverse engineering a war files in eclipse pandian Java Basics 2 March 14th, 2006 09:18 AM



All times are GMT -4. The time now is 09:08 AM.


Powered by vBulletin®
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.
© 2013 John Wiley & Sons, Inc.