Full Disclosure mailing list archives

Re: Any not annoying help welcome


From: adam <iarethebest () gmail com>
Date: Wed, 4 Dec 2013 04:16:56 -0600

If you want anyone to help you with your specific problem, then you need to
provide specifics to your problem. Can you post some (or all) of what
you're trying to decode? If not, can you provide more information on what
you're seeing? What character set? What length? Is any of it human-readable?


On Tue, Dec 3, 2013 at 3:06 PM, ICSS Security <ctrlaltdelete () outlook pt>wrote:

Making a turn here, let's see what turns out!

I know that using Wireshark we can capture traffic in/out of the routers
interfaces.
I don't want to dig up the routers concept because face it i already know
how it works and so do you.

I have only a few questions to ask.

1) The traffic on any device is monitored, correct? So, android devices
too.
2) I have monitor an apk aplication and saved the packets with a succefull
login and an unsuccefull login.
3) I know what the magic number to look for but, i'm unable to go further
decoding the authentification method.

Can anyone give me a hand here or should i go elsewere?

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: