Font Size:
Reverse engineering unknown protocols
Last modified: 2008-08-25
Abstract
In this work we will present our method for analyzing and reverse engineering unknown or proprietary protocols for the purpose of analyzing the protocol security or gaining more insight into the protocols inner operation. We created a method that can be executed manually or can be packed into a fully automatic algorithm.
Full Text:
PDF