You can exploit SQL injection in Visual Basic applications. Also some applications have authentication (users and passwords) information built in the code, so you can look at the .exe using strings (from sysinternals), hex editors, etc. Cesar. --- Some d00d <shavidiat_private> wrote: > > > > > Hi folks > > > > > I am auditing some network application and a > significant number of them are written in MS Visual > Basic. Have anyone done some work on exploiting VB > software before? I assume that traditional methods > such > as buffer overflows will not work here. > > > > > Are there any tools around for this (such as VB > disassemblers and de-scramblers)? > > > Can you point me to any sources of information? > > > > > Thanks in advance, SD __________________________________________________ Do you Yahoo!? Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com
This archive was generated by hypermail 2b30 : Tue Feb 18 2003 - 12:19:09 PST