[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re[2]: [coldsync-hackers] HotSync traffic
- To: Ferry Hendrikx <coldsync-hackers at lusars dot net>
- Subject: Re[2]: [coldsync-hackers] HotSync traffic
- From: Rob Bloodgood <robb at empire2 dot com>
- Date: Thu, 18 Mar 2004 14:30:52 -0800
- In-reply-to: <BAY14-F9S2TRqf69aZb00009ded@hotmail.com>
- Organization: Empire
- References: <BAY14-F9S2TRqf69aZb00009ded@hotmail.com>
- Reply-to: coldsync-hackers at lusars dot net
- Sender: owner-coldsync-hackers at lusars dot net
Tuesday, March 9, 2004, 3:55:31 PM, you wrote:
>>On Wed, 10 Mar 2004, Ferry Hendrikx wrote:
>>> I'd quite like to watch some actual (serial) data traffic between
>>> HotSync and my Palm device (or possibly something like POSE). I'm
>>> interested in the DLP interaction (requests and responses) between
>>> these two.
>>>
>>> Does anyone have any good ideas about how to do this? Things like
>>> snooping the serial device come to mind, but hopefully there is an
>>> easier way.
>> The obvious thing to do is to crank up the debugging. If you run
>>coldsync with '-ddlp:7', you should get a trace of every DLP byte going in
FH> Indeed, but I'm interested in what traffic passes between HotSync and my
FH> Palm device. I've already studied the ColdSync version of this traffic. :)
This seems to have some potential:
http://www.aggsoft.com/products/supercom/serial-port-sniffer.htm
It's trialware, but you should be able to do your sniffing until it
expires. :-)
L8r,
Rob
This message was sent through the coldsync-hackers mailing list. To remove
yourself from this mailing list, send a message to majordomo@thedotin.net
with the words "unsubscribe coldsync-hackers" in the message body. For more
information on Coldsync, send mail to coldsync-hackers-owner@thedotin.net.