What is ngrep and How to Use It?
Reverse engineering tricks: identifying opaque network protocols
Packets Remystified: Broadcast Brujería
Adventures in Bluetooth: Part 1
Reverse Engineering Network Protocols
Reverse Engineering a TCP protocol
Reverse Engineering Binary Protocols to Create IPS Signatures
REVERSE ENGINEERING COMMUNICATION PROTOCOLS (PART 1: REVERSE ENGINEERING THE HARDWARE)
Reverse Engineering BLE Devices
PISE: Automatic Protocol Reverse Engineering
Reverse Engineering Network Protocols
Cold case: protocol reverse engineering
Reverse Engineering iMessage: Leveraging the Hardware to Protect the Software
Discoverer: Automatic Protocol Reverse Engineering from Network Traces
A Survey of Automatic Protocol Reverse Engineering Tools
Automatic Wireless Protocol Reverse Engineering
State of the art of network protocol reverse engineering tools
NETPLIER: Probabilistic Network Protocol Reverse Engineering from Message Traces
Reverse Engineering of Protocols from Network Traces
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces
Reverse Engineering and Serial Adapter Protocols
Reverse Engineering Industrial Control System Field Devices