Uninformed: Informative Information for the Uninformed

Vol 1» 2005.May

Protocol Analysis

Once we get our log of the connection, we'll need to run it through some tools to analyze and decode the protocol. I've put together a couple of simple tools that'll make your life a lot easier. One will simply decode the bytes that are transferred across based on the state changes. The other will graph out the whole conversation 2-dimensionally so you can graphically view patterns in the connection.