General discussion
Thread display: Collapse - |
All Comments
Start or search
Create a new discussion
If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.
Reverse engineering a DLL
Also, with certain restrictions, VB3.0 programs run perfectly under 9x and NT4.0.
Here is my dilemma. Accessing hardware from VB is not a problem...there are plenty of 16 bit DLL's out there that allow VB3 to call functions within the DLL to talk to the outside world. I have several for ISA bus I/O, peripheral control etc and along with the DLL's I have the documentation on how to call the functions/routines within the DLL and what parameters are passed.
BUT....I have acquired a very interesting piece of hardware on an ISA card (what it does is not important) and have scoured the original software on the machine it was installed in, and found a DLL related to the card. Using QuickView allows me to see the names of the exports in the DLL but there I run out of information. I can use my knowledge of electronics to regenerate the circuit diagram of the card and find out HOW it works electronically, but I need a way of 'taking apart' the DLL to work out what the exported functions do and what parameters are passed to and from a routine (integer, single, long, arrays) etc. I know enough about assembly language to reverse engineer a *.com file, but how can I do the same for a DLL? Where can I find information on DLL structures or a tool to show the individual code chunks for each of the exports? I have used a program called Scanbin which gives me a little more info, but I need more data on DLL's themselves...preferably requiring little or no knowledge of C or Pascal!!