top | item 41651732

(no title)

seanc | 1 year ago

In the old days we'd use tcpdump and wireshark for this, but nowadays everything is encrypted up in the application layer so you need this kind of thing. Or tricky key dumping hacks.

discuss

order