Full Disclosure mailing list archives
Re: Any not annoying help welcome
From: adam <iarethebest () gmail com>
Date: Wed, 4 Dec 2013 04:16:56 -0600
If you want anyone to help you with your specific problem, then you need to provide specifics to your problem. Can you post some (or all) of what you're trying to decode? If not, can you provide more information on what you're seeing? What character set? What length? Is any of it human-readable? On Tue, Dec 3, 2013 at 3:06 PM, ICSS Security <ctrlaltdelete () outlook pt>wrote:
Making a turn here, let's see what turns out! I know that using Wireshark we can capture traffic in/out of the routers interfaces. I don't want to dig up the routers concept because face it i already know how it works and so do you. I have only a few questions to ask. 1) The traffic on any device is monitored, correct? So, android devices too. 2) I have monitor an apk aplication and saved the packets with a succefull login and an unsuccefull login. 3) I know what the magic number to look for but, i'm unable to go further decoding the authentification method. Can anyone give me a hand here or should i go elsewere? _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Any not annoying help welcome ICSS Security (Dec 04)
- Re: Any not annoying help welcome adam (Dec 04)
- Re: Any not annoying help welcome ICSS Security (Dec 04)
- Re: Any not annoying help welcome Christopher Dreher (Dec 04)
- Re: Any not annoying help welcome ICSS Security (Dec 04)
- Re: Any not annoying help welcome Michael von Dach (Dec 04)
- Re: Any not annoying help welcome Mr OverBlue (Dec 05)
- Re: Any not annoying help welcome adam (Dec 04)