Hello everyone, well I was attempting to intercept DO packets using java.
To know how do the packets look like I use wireshark and I get something like this:
...........-...............-.......w..I.z.........=}_sc..g..ul..........?.7... \.X...+....y........x....0<l.Q...E..a.....T.$bI.[..U.B..........Gx.L..vr...3/!+..........9........U/.$D;q. #..w......e.I.\.......k"...\...EP.w.M..rE.....j... )...c1.B(.A!n.L...;ze...w...I...g.[X..YgRWT..1.cl.k.W...,...
.b.Q.NY.S.K..pN)n;..2.^.....B.....J..Poi *%.....D..o.H.I.66.a5p..........h..0....#....EoB.x S........~....5"....*.:t......s..3H....a.B._..mwV. ..38`.....k...mh.q.[(.D.{...*%l..,....J.A...W.G
...j.ik.a...y............k.01.dkR...^. ....u. -..'*.B.8.7...4.+..v[..dy.!=:'`]u..N...s..$....+......u.../..n.~.......J...._Fh....$>F*p...
3...@H>..&<..;.:O.k.........7$..";...C..Y...kW.... .B....1/.}..P(I..Ff,..}?+x.x..'.-k..C9..:..|.|.Bm.....*....|.....>M..Bb..u&.9nJP... .a..nD.U..+......[....Us......]...:.M..4Y..wl5...J0X....-.qx............*.N0..S..>..;....C.mk.c.E....O.M... ..4...
N!..Z*...c6.7.X.0.g.....Sa.h/W.....Zk....Z.b....=.P..l(.2.....flJ....``,...hF.. Pg.I...t5...)....v.J.........?.....4...U.a..z.`..U m#.<GC..q#<.M..;YV...W..Y.5lp...9....N|......D...T ..x.;..~g.......5O.........F.%...w^...hk.Y.....DGH .+.*......FS..%.6k....aD.E....*.t...W}8....R..c... ...._..`.`...QLWlG.(...&...n.e^.4..]......M..|<.>I5C.1.vy.2P.i..%bGD..Q......f|....&.. .....Z.....J...j....F..V......%D...Y..c._P..Esc... H.g.5..#...B.f1...y.Q...%.`7:7!.H.r..ih."i^<c..... Q....,..[R
.ty..z:lC...&F..Z.j..5..B.&k..D..(.....K..z....
...^.%R...K
I dont understand how this is encrypted, if someone could help me id appreciate it.
To know how do the packets look like I use wireshark and I get something like this:
...........-...............-.......w..I.z.........=}_sc..g..ul..........?.7... \.X...+....y........x....0<l.Q...E..a.....T.$bI.[..U.B..........Gx.L..vr...3/!+..........9........U/.$D;q. #..w......e.I.\.......k"...\...EP.w.M..rE.....j... )...c1.B(.A!n.L...;ze...w...I...g.[X..YgRWT..1.cl.k.W...,...
.b.Q.NY.S.K..pN)n;..2.^.....B.....J..Poi *%.....D..o.H.I.66.a5p..........h..0....#....EoB.x S........~....5"....*.:t......s..3H....a.B._..mwV. ..38`.....k...mh.q.[(.D.{...*%l..,....J.A...W.G
...j.ik.a...y............k.01.dkR...^. ....u. -..'*.B.8.7...4.+..v[..dy.!=:'`]u..N...s..$....+......u.../..n.~.......J...._Fh....$>F*p...
3...@H>..&<..;.:O.k.........7$..";...C..Y...kW.... .B....1/.}..P(I..Ff,..}?+x.x..'.-k..C9..:..|.|.Bm.....*....|.....>M..Bb..u&.9nJP... .a..nD.U..+......[....Us......]...:.M..4Y..wl5...J0X....-.qx............*.N0..S..>..;....C.mk.c.E....O.M... ..4...
N!..Z*...c6.7.X.0.g.....Sa.h/W.....Zk....Z.b....=.P..l(.2.....flJ....``,...hF.. Pg.I...t5...)....v.J.........?.....4...U.a..z.`..U m#.<GC..q#<.M..;YV...W..Y.5lp...9....N|......D...T ..x.;..~g.......5O.........F.%...w^...hk.Y.....DGH .+.*......FS..%.6k....aD.E....*.t...W}8....R..c... ...._..`.`...QLWlG.(...&...n.e^.4..]......M..|<.>I5C.1.vy.2P.i..%bGD..Q......f|....&.. .....Z.....J...j....F..V......%D...Y..c._P..Esc... H.g.5..#...B.f1...y.Q...%.`7:7!.H.r..ih."i^<c..... Q....,..[R
.ty..z:lC...&F..Z.j..5..B.&k..D..(.....K..z....
...^.%R...K
I dont understand how this is encrypted, if someone could help me id appreciate it.