|
|
I have started to gain an interst in how Aim communicates with the aol servers. My question is: Is there any program that shows how input on the Aim window is transferred to the servers?
6 responses total.
Probably what you'd need to do is use a "packet sniffer" on the network traffic from your machine to the Internet. If you are connecting via dialup on the same machine, you might be able to do this simply with an external modem and sort of a Y-cable so that another serial port can listen to the modem port (it's probably still possible to buy "RS-232 breakout" software for this). Or if you are on a LAN you can get software to listen to the TCP/IP data, even the stuff coming out of the same machine the software is running on. I don't know what Windows-based sniffer software is going for these days, but you can get Linux stuff usually for the trouble of downloading and figuring it out.
I have another quistion: There is an aim .dll file that i would like to see. My question is what utility would one use to view dll files would visual studio work? thanks in advance
Do you mean to decompile the code of the dll or simply to find it? To find it there is a ahre ware utility that will show all DLLs in use on your machine. I don't remember the name but try a google search. For decompiling questions try asking on the jellyware conf.
What I meant was I wanted to decompile a *.dll file. Idlemon.dll is an aim file thats being edited by people (or by one person and spread around) that allows you to talk while appearing to be in a idle state. I just wanted to decompile the file to see what part of it is being edited. Also, has anyone used the windows version of nmap? I haven't heard anything about it. later.
I learn something new everytime i go into one of these conferences, intelligent people please respond to his questions.
The distributor of that DLL file should be able to provide you with a list of the object classes and methods exposed in that DLL. Regarding nmap on Windows, I use it regularly in the practice of systems and network administration for testing purposes. While it has a few deficiencies (no real concept of UID 0, bizarre behaviour of the Windows TCP/IP stack, quirks in the implementation of WinPCap, the inability to scan at localhost), it is very useful. If you first encountered nmap on a UNIX workstation, be aware that the windows version does not provide a Motif GUI, so you will be stuck in a DOS/cmd prompt.
Response not possible - You must register and login before posting.
|
|
- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss