Since I’ve used many protocol analyzers, I am always curious how software works, how it behaves and how to identify when it behaves poorly or is inefficient.
This article will not address or reference applications that are encrypted, or use encryption in any way since that is a whole other topic.
In this article, I show you how to configure Wireshark, and more importantly why I configure certain options to capture the command sent by Contacam (https://www.contaware.com/contacam.html) and how to mimic that using another video player (https://www.videolan.org/vlc/) .
I wanted to ensure that you understood what I did and why so you can replicate this simple methodology with other applications.
Enjoy
Kommentare