This is our old Q&A Site. Please post any new questions and answers at

I'm trying to view the communications between a game and it's server. I believe it is using some form of UTF8 encoded xml but wireshark is only showing application/octet-stream and I'm not able to get the text from these files. The server name has xrpc in it, so I'm assuming it's using xrpc or xml-rpc.

Could someone provide guidance on how to extract the payload in clear text instead of having to view it in hex?

asked 23 Nov '16, 11:04

octrevolution's gravatar image

accept rate: 0%

edited 23 Nov '16, 11:54

It looks like the name XRPC is used both for an XML based RPC protocol as a gaming protocol. I'm sure the latter has been used. A little googling on games and xrpc lays a link with jrpc. From there on I think if you want to extract meaningful data from the communication, all you can do is start reverse engineering the network protocol. This is beyond the scope of this Q&A site.

If you do have reverse engineered the protocol, you might be able to write dissector-code so that Wireshark can present you with the protocol fields in a meaningful way.

permanent link

answered 24 Nov '16, 03:43

SYN-bit's gravatar image

SYN-bit ♦♦
accept rate: 20%

Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here



Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text]( "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:


question asked: 23 Nov '16, 11:04

question was seen: 1,525 times

last updated: 24 Nov '16, 03:43

p​o​w​e​r​e​d by O​S​Q​A