in reply to Re^4: Socket unpack
in thread Socket unpack
I'm not aware of any book on reverse engineering. Reverse engineering is to me not unlike debugging, except that you have no access to the source code of either end of the communication. You will need to monitor all communication between the two parts of your program, and try to associate the communication with certain actions that you can identify, like "if I press this button, it sends the following byte sequence". Then you will need to try to replay that communication on your own.
So far, you haven't even told us what application you are trying to automate, and what setting it is, so we can't likely help you further.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^6: Socket unpack
by cdarke (Prior) on Feb 16, 2010 at 13:05 UTC | |
|
Re^6: Socket unpack
by Anonymous Monk on Feb 16, 2010 at 11:01 UTC |