BoerJudas
December 21st, 2008, 11:41
Hi everyone...I am new here and all i can say is: this site rocks!!!! 
I have a small question for you guys that i cant figure out (nor google for that matter):
Are the RVA's/exported names of the winsock obfuscated?
When I open the ws2_32.dll in olly and lordpe the rva for the function "send" is 0x659B, but when i open it in a tool i am busy developing i get the rva as
0x418A (which is actually the rva for "getaddrinfo"
. ALL the functions are obfuscated like this when i view it in my tool; all the rva's point to diffrent, yet valid, functions.
I think this might be due to the fact that my tool is reading the export directory from file and not from memory (like ollydbg). But as far as I know, LordPE also reads from file and not from memory, but it retrieves the correct addresses.
All other dlls i have tested with had no problems, that is why i dont think there it is programmatical error in my application causing this.
Any ideas?
Regards
Jud

I have a small question for you guys that i cant figure out (nor google for that matter):
Are the RVA's/exported names of the winsock obfuscated?
When I open the ws2_32.dll in olly and lordpe the rva for the function "send" is 0x659B, but when i open it in a tool i am busy developing i get the rva as
0x418A (which is actually the rva for "getaddrinfo"
. ALL the functions are obfuscated like this when i view it in my tool; all the rva's point to diffrent, yet valid, functions.I think this might be due to the fact that my tool is reading the export directory from file and not from memory (like ollydbg). But as far as I know, LordPE also reads from file and not from memory, but it retrieves the correct addresses.
All other dlls i have tested with had no problems, that is why i dont think there it is programmatical error in my application causing this.
Any ideas?
Regards
Jud
