Solved

intercept/analyse traffic of flash applet

Posted on 2002-03-23
3
245 Views
Last Modified: 2008-02-01
Hi,

I would be interested if it is possible to intercept/analyse the exact traffic of for example flash or also java applets which are on websites which you visit.

Sometimes I would really wonder what sort of informations those applets are sending to someones servers...

Any ideas?

Is it possible to somehow "hook" into for example a flash-applet on the active website and monitore the traffic between that flash-application and the internet?

delphiheaven
0
Comment
Question by:delphiheaven
  • 2
3 Comments
 
LVL 1

Expert Comment

by:Moondancer
ID: 6973810
Would you like a refund here, since nothing has transpired?

Perhaps, you'll benefit by this refund and posting it again to draw current attention, your choice, of course.

Moondancer - EE Moderator
0
 

Author Comment

by:delphiheaven
ID: 6973823
yes, but how can I do that?
0
 
LVL 1

Accepted Solution

by:
Moondancer earned 0 total points
ID: 6974218
Hi, delphiheaven.

I have refunded 100 points to you for this question and closed it.

Anytime you need our help for such special handling needs, just post a zero point question in the Community Support topic area with the link to the question where you need our help.

:) Moondancer - EE Moderator
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question