Reverse Engineering Reveals Hidden API in Abandonware Trail Camera

It sometimes seems like there are two kinds of cheap hardware devices: those dependent on proprietary software that is no longer available and those that are equally dependent but haven’t …read more Continue reading Reverse Engineering Reveals Hidden API in Abandonware Trail Camera

Why is the output of tshark `http.file_data` different from the Content Length? [migrated]

I’ve got a PCAP file that has 3,445 HTTP "206 Partial Content" packets for the application/pdf media type. Each of these requests is for the same file, different Content-Ranges are being requested each time as a covert means of d… Continue reading Why is the output of tshark `http.file_data` different from the Content Length? [migrated]

What is sequence number and why is it used as the ACK number for the next ACK packet? [closed]

I am currently trying to learn the TCP session creating (3 way handshake) process in detail. I was wondering what the sequence number means and also why is the ack num for the next ACK packet always the sequence number of the previous pack… Continue reading What is sequence number and why is it used as the ACK number for the next ACK packet? [closed]

Decrypting TLS traffic from windows desktop application [closed]

I have a desktop application on Windows that connects to a server which I don’t have access to. I want to reverse engineer an API for personal use so I can connect from a custom interface instead of using the official application.
Using Wi… Continue reading Decrypting TLS traffic from windows desktop application [closed]