BoerJudas
December 21st, 2008, 11:41
Hi everyone...I am new here and all i can say is: this site rocks!!!! 
I have a small question for you guys that i cant figure out (nor google for that matter):
Are the RVA's/exported names of the winsock obfuscated?
When I open the ws2_32.dll in olly and lordpe the rva for the function "send" is 0x659B, but when i open it in a tool i am busy developing i get the rva as
0x418A (which is actually the rva for "getaddrinfo"
. ALL the functions are obfuscated like this when i view it in my tool; all the rva's point to diffrent, yet valid, functions.
I think this might be due to the fact that my tool is reading the export directory from file and not from memory (like ollydbg). But as far as I know, LordPE also reads from file and not from memory, but it retrieves the correct addresses.
All other dlls i have tested with had no problems, that is why i dont think there it is programmatical error in my application causing this.
Any ideas?
Regards
Jud

I have a small question for you guys that i cant figure out (nor google for that matter):
Are the RVA's/exported names of the winsock obfuscated?
When I open the ws2_32.dll in olly and lordpe the rva for the function "send" is 0x659B, but when i open it in a tool i am busy developing i get the rva as
0x418A (which is actually the rva for "getaddrinfo"

I think this might be due to the fact that my tool is reading the export directory from file and not from memory (like ollydbg). But as far as I know, LordPE also reads from file and not from memory, but it retrieves the correct addresses.
All other dlls i have tested with had no problems, that is why i dont think there it is programmatical error in my application causing this.
Any ideas?
Regards
Jud