This report presents the results of automated protocol reverse engineering performed by the Oscura framework. The analysis identified protocol characteristics, decoded message structures, and generated working dissectors for further analysis.
| Property | Value |
|---|---|
| Protocol Name | {{ protocol_spec.name }} |
| Baud Rate | {{ protocol_spec.baud_rate|format_number }} bps |
| Frame Format | {{ protocol_spec.frame_format }} |
| Sync Pattern | {{ protocol_spec.sync_pattern }} |
| Frame Length | {{ protocol_spec.frame_length or "Variable" }} bytes |
| Checksum Type | {{ protocol_spec.checksum_type or "None detected" }} |
| Checksum Position | Byte {{ protocol_spec.checksum_position }} |
| Detection Confidence | {{ (protocol_spec.confidence * 100)|round(1) }}% |
| Field Name | Offset (bytes) | Size (bytes) | Type |
|---|---|---|---|
{{ field.name }} |
{{ field.offset }} | {{ field.size }} | {{ field.type }} |
The following artifacts were generated and can be used for further analysis:
{{ artifact.path }}
{{ value }}