WSOCK32 API intercept

Is it possible to hook WSOCK32 API calls, in a pre-emptive
Windows 95 environment ?
If the answer is Yes, could I get a (minimal) sample of source code on how to do this ?
Note: The article on PROCHOOK in MSJ(Jan94) does
only work in a 16-bit environment.
andre_cAsked:
Who is Participating?
 
jhanceConnect With a Mentor Commented:
The September 1997 issue of Microsoft System Journal in Matt Pietrek's "Under the Hood" column addresses just this issue.

See http://www.microsoft.com/msj/0997/hood0997.htm
0
 
andre_cAuthor Commented:
Edited text of question
0
 
tflaiCommented:
This is a tough one.  Currently I'm aware of maybe only two approaches:
1.  There is a  program called MPATH. It is what Quake used to access window's winsock features.  I don't know much about it.  And probably the only source to contact is the company of Quake.
2.  I've done a VxD that grabs MSTCP VxD's entry table.  The functions here are at one level lower than WSOCK32, but you do have access to all TCP and UDP controls.  You just don't have that nice socket interface.
0
 
andre_cAuthor Commented:
Adjusted points to 200
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.