3

I used several Disassemblers/Debuggers/Decompilers to reverse a VB6 application which connects to a remote database using msado26.tlb and mswinsck.ocx

I understood that the connection should be done using a COM calls through msvbm60.dll.

It has been told that functions like: emphasized text__vbaObjSet,__vbaLateIdCallLd,__vbaHresultCheckObj,__vbaNew2, should be used with the proper CLSID pushed/passed as argument to the call.

However, I couldn't find where exactly this call is made.

My question is:

Which "sequence of disassembly instructions". would be a call to the winsock or the ADO library?

RBT
  • 24,161
  • 21
  • 159
  • 240
MedUnes
  • 39
  • 2
  • What information are you looking to discover? You could always create a trivial vb6 exe that instantiated an ado object and then look at the runtime calls it makes. – Alex K. May 14 '16 at 17:25
  • Do you know anything about the back end database? If it is something like SQL server then it may be easier to put a trace on that too see what the app is doing with the DB. – OldBoyCoder May 15 '16 at 06:22

1 Answers1

0

Just put breakpoints on these functions then inspect the stack and registers for the passed parameters and try to compare the eventual HEX values with the CLSID you are looking for.