flat assembler
Message board for the users of flat assembler.
![]() |
Author |
|
rambo
i`ve heard about trick by which a com file can be executed in 32bit mode and is able to call any of windows` functions.
anyone heard about this? |
|||
![]() |
|
T&K(r)
This may be useful for erveryone interesed this problem - file in this link contains DOS documentations about Interrupts, ( full version of this doc contains also CMOS, x86 bugs, ports and more )
THe author of this Files is Ralf Brown The link : http://80.48.56.2/~grog/gr0g/inne/extras/specyfikacje/interrup.zip _________________ my GG ( Polish Instant Messager ) number is 8734187 Gdy widzisz kolejke - wstąp do niej - co ci szkodzi ![]() |
|||
![]() |
|
vid
maybe wat you meant are some multiplex interrputs (int 2Fh i think) which are created by DOS 7.0 (one which comes with windows), They have functions like creating file with long name, etc. to use some of windoze's unctionality under DOS, but they aren't really windoze's functions
|
|||
![]() |
|
f0dder
Quote:
They only allow very limited functionality, and they only work while windows is loaded (dos box under windows = works, plain DOS7 mode = doesn't) |
|||
![]() |
|
T&K(r)
Quote: They have functions like creating file with long name, etc. to use some of windoze's unctionality under DOS, but they aren't really windoze's functions Look at this attached file - it's a part of linked by me Doc about interrputs - I edited only Interput functions that is about Windows You can get adress of API entry point, and more interrising - get device api point Sorry that this Doc is only for Win.311 max. ( Interputs writed in this file maybe can't run in WinXP - i don't know )
_________________ my GG ( Polish Instant Messager ) number is 8734187 Gdy widzisz kolejke - wstąp do niej - co ci szkodzi ![]() |
|||||||||||
![]() |
|
r22
Could you execute say Rundll32.exe from the com with command line parameters. If so that would be a cheesy api usage hack.
|
|||
![]() |
|
< Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2020, Tomasz Grysztar. Also on GitHub, YouTube, Twitter.
Website powered by rwasa.