Decoding a tcp response
Go to solution
Solved by Eigenvektor,
I'm guessing they are using bits as flags (so bits 3, 14 and 128 would be set) and you're also dealing with endianess
8 16 24 32 00000100 00100000 00000000 00000000 = 0x04200000 40 48 56 64 00000000 00000000 00000000 00000000 = 0x00000000 72 80 88 96 00000000 00000000 00000000 00000000 = 0x00000000 104 112 120 128 00000000 00000000 00000000 10000000 = 0x00000080
If you put all those hexadecimal numbers together, you get 0x0420000, 0x00000000, 0x00000000, 0x00000080
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now