wireshark capture grpc packet

Grpc server side exposes port 9898

1. Filter port 9898

2. Find the psh trace stream

3. tcp trace flow analysis

 

5. Get the data content and remove the line break

505249202a20485454502f322e300d0a0d0a534d0d0a0d0a000018040000000000000200000000000300000000000400100000000600002000

000004080000000000000f0001

000000040100000000

000076012400000003000000000f418ca0e41d0b4d65645905b3b96c44946272d141fc1eca245f71a9ae82b1b87eb1968a0f83865f8b1d75d0620d263d4c4d656440027465864d833505b11f7a909acac8b741f71ad51529f4c057081707408e9acac8b0c842d6958b510f21aa9b839bd9ab408a9acac8b26c190ab466ab0000000b00010000000300000000060a0474657374

 

 

 

 

 

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325201457&siteId=291194637