Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Anyone come up with good techniques for reverse engineering websockets?

Its especially annoying since many use binary message formats and there isnt a great way to document an arbitrary binary message protocol.

A couple techniques im trying out:

- websocat and wsrepl for reverse engineering interactively: https://github.com/doyensec/wsrepl

- kaitai struct for documenting the binary message formats: https://kaitai.io/



I'm very interested in this, I do a lot of protocol debugging. Kaitai looks very neat - is that the most popular format for this kind of thing, or are there other popular options I should look at too?


Just lately somebody posted about the Imhex tool's DSL: https://xy2i.blogspot.com/2024/11/using-imhexs-pattern-langu...


I recently wanted to reverse engineer some Websocket packets for a game I was playing. I used BurpSuite as a proxy to bypass the SSL encryption. It also has a pretty handy tool that will monitor all websocket traffic.

After that I used ImHex, pretty much exactly like in that blog to reverse engineer the websocket packets. The DSL is a little finicky but once you wrap your head around it, it`s very nice and powerful.


Thanks for sharing your experience, it is valuable as I am considering using Imhex and its DSL lately.


kind of a tangent but for some services they switch to use http APIs if you disable web sockets which makes it more convenient (cough Microsoft Delve)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: