Cold case: protocol reverse engineering (part 2)
If you missed the previous post, you can find it here.
If you missed the previous post, you can find it here.
Some years ago I was asked to do a reverse engineering of an older protocol used in automation systems.