Aug-18-2020, 08:40 AM
If the details of the server and the protocol used by the client and server aren't publicly available, then you need to use some techniques to try and infer them. That's what reverse engineering is. In this case, I thought your approach was to understand the network traffic to try and reverse engineer, but OK.