The Hacker News Logo
Subscribe to Newsletter

Reverse Engineering of Proprietary Protocols, Tools and Techniques !

Reverse Engineering of Proprietary Protocols, Tools and Techniques !



This talk is about reverse engineering a proprietary network protocol, and then creating my own implementation.

The talk will cover the tools used to take binary data apart, capture the data, and techniques I use for decoding unknown formats. The protocol covered is the RTMP protocol used by Adobe flash, and this new implementation is part of the Gnash project.

Download Complete Video :
WMV3 1024x768 | MP3 48 Kbps | 183 MB

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.
SHARE
Comments
Latest Stories
Best Deals

Newsletter — Subscribe for Free

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.