I'm decoding some snort/acid data for a waste/fraud/abuse case and I came across some hex-encoded AIM data that I'd like to parse so I can follow some chat conversations.
Has anyone ever decoded the data.data_payload field? Does anyone have the code handy so I won't have to reinvent the wheel?
I appreciate it.
J. J. Horner,
CISSP,CCNA,CHSS,CHP,blah,blah
jjhorner@safe-mail.net