Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pcap parse command #5

Open
gebn opened this issue Aug 1, 2019 · 0 comments
Open

Pcap parse command #5

gebn opened this issue Aug 1, 2019 · 0 comments

Comments

@gebn
Copy link
Owner

gebn commented Aug 1, 2019

Wireshark does not show all fields, and cannot decrypt. We can do both. Input is the packet source and password; from that, the decrypted (if necessary) packet stream is printed. We print as much as possible about unknown commands - can at least get the message layer, then print spaced hex for what we don’t know.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant