Vulnerability Development mailing list archives
Re: VisualBasic auditing
From: "Arjun Pednekar" <arjunp () nii co in>
Date: Wed, 19 Feb 2003 09:55:48 -0800
Hello, If the VB Application is compiled in P-CODE, then you can try out WKT-VBDebugger (www.exetools.com/debuggers.htm) which is a good tool for Reverse engg of VB Applications. Regards Arjun Pednekar, Systems Security Analyst, Network Intelligence India Pvt. Ltd., Web: http://www.nii.co.in Phone: 91-22-22001530 / 22006019 ============================= AuditPro for Windows http://www.nii.co.in/software/apwin.html ============================= ----- Original Message ----- From: "Some d00d" <shavidi () yahoo com> To: <vuln-dev () securityfocus com> Sent: Sunday, February 16, 2003 11:12 AM Subject: VisualBasic auditing
Hi folks I am auditing some network application and a significant number of them are written in MS Visual Basic. Have anyone done some work on exploiting VB software before? I assume that traditional methods such as buffer overflows will not work here. Are there any tools around for this (such as VB disassemblers and de-scramblers)? Can you point me to any sources of information? Thanks in advance, SD
Current thread:
- VisualBasic auditing Some d00d (Feb 18)
- RE: VisualBasic auditing Rob Shein (Feb 18)
- Re: VisualBasic auditing Cesar (Feb 18)
- Re: VisualBasic auditing2 gr00vy (Feb 20)
- Re: VisualBasic auditing Voguemaster (Feb 20)
- Re: VisualBasic auditing Arjun Pednekar (Feb 20)
- <Possible follow-ups>
- RE: VisualBasic auditing Kayne Ian (Softlab) (Feb 20)