Monitoring API calls [duplicate]

女生的网名这么多〃 提交于 2019-12-04 12:57:34

问题


I am doing some reverse engineering and want to know which APIs are called from the executable. I am mostly interested in the APIs called on a particular Windows system DLL.

I guess one way to do that is to get all APIs exposed from the DLL using dumpbin and put breakpoints on all those from Windbg.

Any other approach? This seems like lot of time if I need to monitor many system DLLs.

BTW, I am working on Windows XP and want to monitor one executable which calls some Windows system DLL functions.


回答1:


http://www.rohitab.com/apimonitor/

API Monitor does exactly what you're looking for. However, there are too many API calls listed and it becomes very difficult to analyse.

Here's a downloadable screenshot.




回答2:


I think you can use dependancy walker




回答3:


Use the Win32 Kernel Hooking apis, exported by ordinal since NT4
codeproject 'article' is completely obsolete...




回答4:


This CodeProject article dealing with API hooking may be helpful to you.

There are also tools available, like APISpy32 or SpyStudio.



来源:https://stackoverflow.com/questions/961779/monitoring-api-calls

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!