Re: [protobuf] Decoding message protobuff

2018-07-17 Thread Marc Gravell
Btw you might find https://protogen.marcgravell.com/decode useful - it explains how each byte is interpreted. It doesn't give the details (so: it doesn't explain how varint works), but it at least makes it explicit which bytes have contributed to which outcomes. On Tue, 17 Jul 2018, 08:22 Marc

Re: [protobuf] Decoding message protobuff

2018-07-17 Thread Marc Gravell
AA 06 is indeed 101, that's "varint" encoding. The MSB of each byte is continuation, 7 bits payload, and adjust for endianness. The idea of decode-raw is that it is enough to start guessing at how to reverse engineer a message, for example you can see values that are clearly string IP-addresses.

[protobuf] Decoding message protobuff

2018-07-16 Thread wildhunterabhi
How to decode protobuff embedded message. Please give any pseudo code. I see aa 06 gets decoded as 101. Please let me know how? Protobuff data: echo -n "0a 0b 31 39 32 2e 31 30 2e 31 31 2e 31 10 01 aa 06 88 01 e2 a4 01 83 01 1a 80 01 0a 1e 0a 06 70 6f 72 74 5f 32 10 80 b7 e3 88 08 18 02 32 0c