How to Window Message Handeling in other Process? - Windows Mobile Development and Hacking General

I need to hook the Window Message of the one process in other process?
I get the window handle but not handle the messages?

You should inject your DLL into that process and hook the windows' wndproc using SetWindowLong. Look into cproghook source core at mamaich.kasone.com

I not found cproghook source code in http://mamaich.kasone.com/

Sorry
I found.
Thanks.

Related

Java Midlet Question

I really want to use a name picker (randomly picks a name from a pre-defined list)
Google reveals this java version is exactly what I need for a desktop
Is there any way I can use it on the pocket pc (does not work in midlet manager)
http://www.davebsoft.com/jaws/apps/namepicker.jnlp
You normally need a jar version of the program to work with midlet manager - best you do a search for a jar version.
The author kindly sent me his JAR file for this app. I have placed it onto my device but cannot open it
Is it incompatable or am I making a silly mistake
Thanks
Hays
Is that the zip he sent you or did you send you a jar file? Even when i rename it namepicker.jar it wont install, i am sure there is something wrong with the file.
Is that the zip he sent you or did he send you a jar file? Even when i rename it namepicker.jar it wont install, i am sure there is something wrong with the file.
he sent this text in his email
The jar file is here, but it probably isn't set up the way you need it:
http://davebsoft.com/jaws/apps/lib/namepicker.jar
I downloaded it but can't get it working
yep - still says invalid - contact the author again he must have a valid jar that works
will do
thanks for your help
the author replied
"invalid" in what context? It's valid in the context in which you've been
running it on your PC or whatever. Maybe it lacks a manifest file or
something. There are free tool to extract and rebuild jar files.
The message it gives is that it has an 'invalid java application desciptor' i.e. the jad part of the jar is wrong.
just a guess, but its probably made for jave for desktops, not j2me.
OMG. The Java that is written is for PC (or eqv) Java not for Java for phone (eg. midlet). That's why it doesn't run. Midlet is a very small subset of the real Java, the code is different, and there isn't much function in midlet version of java, and it is a pain to program in midlet-java (whatever you call it). Hence the JAR is not working. Try running it on your PC, it will work.
No, you can't extract it and run it on your midlet-enabled phone. No, even if you have the source, you can't do that either, unless you translate the code manually. I don't think there is a converter for that matter, especially it involved GUI.
That explains it
Anyone up for the challenge of writing a good pocket pc version ??
Hays
Try this one...
This is an OSS JVM that's meant to be J2SE compliant so it might just run. Try your luck.

Application Blacklists for WM6

Hi,
I have just been on the following thread:
http://www.satter.org/2007/03/lets_shell_some.html
And want to know if anyone can assist me in this forum with the production of a working file for the thread.
I created a CPF file and dropped it into the Herald and executed it. I received an System Notification entry in my Text messaging folder stating 'your device settings cannot be changed by Test.cpf'
Does anyone know whether this is because I do not have the OTA Enterprise prvileges or is ot just that I screwed up in the execution of the file or contents?
I thought in the file it suggests I only need manager access to execute these entries.
All comments are appreciated - I am not a hardcore developer so I have posted this with some trepidation but I need a little help here to get the example working.
Kind Regards,
PianoSam.
make an application unlock
Erofich,
Many thanks for your reply but I wonder if you can explain a little further...
Is it possible to execute changes to the registry with a file like this or do I need to do some programming?
Sorry for my being so ignorant...
PianoSam.

HELP: How to hack a executable file

hi buddies, does anyone one know how to hack an app? for example, change a predefined (hard coded) path like "\storage card" to any other locations. I tried to use hex editor but couldn't find any paths hard coded. I know there's a program called "Olly Debugger" for Win32 which can change binary code to machine code. However it doesn't support PPC applications. Can anyone help?
Many thanks!!
If the path does not appear in the executable then it is not hard coded in the program.
Hard coded strings, string tables, static data and the like, get bundled together by the linker into a separate data segment. They would all appear in the same area within the exe.
The program is probably using FindFirstFlashCard() and FindNextFlashCard() functions to emumerate storage devices. "Storage Card" would be returned by this/these function(s) at run time.
Another reason may be that the executable has been 'signed'. In this case the code is encrypted with the certificate so the hard coded stuff cannot be seen. Altering the code here will invalidate the checksum and the operating system will refuse to run it.
hi stephj, thanks for your info! finally i can figure out the location is hard coded in a dll file instead.
btw do you know how to convert a module (in the form of folders) into a binary dll?
thanks!!
Not quite certain what you mean. A DLL file is the same structure as a .EXE except that it does not have a WinMain() function that a .EXE file has that the loader calls once it is loaded.
Once a DLL is loaded the loader can resolve the real address(es) of its exported function(s).
sorry, i was talking about the modules in rom cooking. after dumping the rom, some DLLs appear in the form of modules (which are folders). what I want to know is the ways to convert these folders into binary files.
In that case it's over to the chefs. My expertise is in the area of application development.
Thanks stephj!!
To convert module to file, look for recmod
It will give you a plain .exe/.dll you want to modify.
After you do it, restore it using reversmod

Disassemble or Reverse Engineer WM 6.5 dll

Can anyone suggest tools/utilities that would allow me to disassemble a WM 6.5 dll to reveal it's methods and parameters? In .net desktop world I can use tools like Reflector to do this, but I seem to be having difficulty doing this on WM apps.
Unregister dll - EDiT - Register dll
Here two threads discussing Developer tools & Kitchen Utilities for (ROM) Chef's;
Kitchen Utensils
60 Universal Tutorials for Customizing any Device and Cooking
Have fun, develop something nice for free and please do it here on xda-developers
There are a lot of ifs and buts to this but here goes:
If the dll was created as a .NET app, then reflector should be able to list the code within it, as it will contain the MSIL code within it. If it has been run through an obfuscator when it was built, this can mangle some of the internals and give Reflector a bit of a hard time.
Otherwise it will be a Win32/MFC/ATL object containing ARM object code. A DLL file is the same format as an exe file i.e. Microsoft's PE (Portable Executable) format. Microsoft's DUMPBIN, part of Visual Studio, (run it from the VS Command Prompt), is able to dump out the EXPORT table which lists the public functions visible in it.
There is a freeware ARM dissassembler , CHARMED, which can run on your device which can display the ARM assembly code, but to make any sense out of it, you will require a pretty good knowledge of the ARM instruction set and basic knowledge of how compilers work. If you don't know what a stack frame is, you'll struggle.
Providing a link to chARMed and C/P from that page
stephj said:
There is a freeware ARM dissassembler , CHARMED, which can run on your device which can display the ARM assembly code, but to make any sense out of it, you will require a pretty good knowledge of the ARM instruction set and basic knowledge of how compilers work. If you don't know what a stack frame is, you'll struggle.
Click to expand...
Click to collapse
Here is the link for this nice freeware ARM dissassembler;
http://sites.google.com/site/naphos/software
Requirements: Windows 98,Me,2000,XP Size: 246kb Description: ABOUT ChARMeD:
ChARMeD is a Windows Mobile / Pocket PC / Win CE (for ARM CPUs) Disassembler and Assembler
The name ChARMeD stands for:
Carolo's Hexadecimal ARM Editor and Disassembler
FEATURES:
· Disassemble a Windows CE Executable for ARM CPUs.
· Assemble instructions in ARM Assembler.
· Upload modified file to Windows CE Device.
· View MZ and PE Headers of executable.
· View Import Table of executable.
ASSEMBLER:
· Added NOP instruction 0x90909090, which is not part of the ARM instruction set, but nevertheless works because it is an undefined instruction.
· Supports all no operand instructions, Branches (Jumps) and instructions with two registers as operands.
DISASSEMBLER:
· Recognises 0x90909090 as NOP (see ASSEMBLER above)
· Supports all no operand instructions, Branches (Jumps) and double operand instructions.
ARM Classic Processors
ARM Infocenter
I think IDA is standard for this kinda reversing. If you can find a location where the DLL is called from in another app, you should be able to quickly identify at least the number and format of the parameters. Obviously you can also refer to the import/export tables for this.
V
Awsome bits of info to get me started ... thanks!!
Is a DLL signed?
And if it is, how does one know it? I use a tool from sysinternals called Sigcheck
Sigcheck
Verify that images are digitally signed and dump version information with this simple command-line utility.
One way to use the tool is to check for unsigned files in your \Windows\System32 directories with this command:
Code:
sigcheck -u -e c:\windows\system32
Though there are way more options than the example above.
As all reverse engineers/hackers or cooks you too should investigate the purpose of any files that are not signed.
Besides some nice sysinternals standard utilities, there's also;
SystemInternals_Suite
For obvious reasons I'm using not a direct link to the Suite. Therefore you need to click on it (on the left) yourself. There's a load of useful utilities there waiting to be downloaded by (would be) developers, power users and system / network administrators (are we not all).
If it is signed with a signature; you need to unsign it before editing it!
It's dead easy.
1) Copy your DLL from your phone to your PC. You may need to use ROMExtractor to do this if you have problems.
2) Unsign it using Unsigner. To do this download Unsigner and the Unsigner batch file here. Copy Unsigner, the Batch file and the dll from the phone to one directory and run the .bat file. It should tell you that the certificate has been removed.
3) Download Reshack
4) Open the dll from the phone using Reshack or the better not free PE Explorer
5) Do your editing.
6) Click Compile String at the top and then save the file.
7) Download Ssigner. Launch it and use Select File to select the DLL file you've just modified. Click Start Sign Process! When it's done check the text file that's created to make sure it signed properly.
8) Copy the file back to the Windows directory on the device using for PPC/handheld/CE free Total Commander. If necessary Reboot.
Kitchen Utils Reviewed gives links to programs a developer / cook needs!
Have fun edtinig, vewinig ,bwroisng, assilimating, copamirng and itengaritng your files,
o/~

Can't open the command prompt

As usually I right click in the folder that contains Nexus 4 driver, adb to open a command prompt, but a popup appears (the label is Explorer.exe), it says "This file does not have a program associated with it to perform this action. Please install a program, or if one is installed already, creat an association with it in the Defaul program control panel."
Anyone has a clue to solve this problem?
Thanks a lot.
Solved. In case someone has the same problem. Use the attached file to fix.
Concern about the source of the file? Dont worry. It's from the Admin of www.sevenforums.com. Thanks to him or her again.

Categories

Resources