Ask Your Question

Revision history [back]

Use wireshark to scrape data stream used by ToS

I see some discussion above to use wireshark to scrape data stream used by ToS. It is still an unsolved problem. It seems to be a difficult problem to solve.

Let me know when you get to the ssl encryption part in Wireshark. That’s where I am stuck right now.

The encryption seems to be hard to solve. Let alone the binary data form that needs to deciphered, too.

Bear in mind, this is a binary format they use too, not some god awful JSON/XML format that ToS probably uses which consumes 100x more bandwidth.

Does anybody have any idea on whether it is feasible for a person experienced in reverse engineering to decipher the underlying communication data used by ToS? If so, how to tackle this problem effectively?