If you want anyone to help you with your specific problem, then you need to provide specifics to your problem. Can you post some (or all) of what you're trying to decode? If not, can you provide more information on what you're seeing? What character set? What length? Is any of it human-readable?
On Tue, Dec 3, 2013 at 3:06 PM, ICSS Security <ctrlaltdel...@outlook.pt>wrote: > Making a turn here, let's see what turns out! > > I know that using Wireshark we can capture traffic in/out of the routers > interfaces. > I don't want to dig up the routers concept because face it i already know > how it works and so do you. > > I have only a few questions to ask. > > 1) The traffic on any device is monitored, correct? So, android devices > too. > 2) I have monitor an apk aplication and saved the packets with a succefull > login and an unsuccefull login. > 3) I know what the magic number to look for but, i'm unable to go further > decoding the authentification method. > > Can anyone give me a hand here or should i go elsewere? > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/