I'm don't know how current reversing efforts are being performed but I was wondering if it'll be enough.
Cause for example I can imagine it being extremely useful to have a recording of the software while a network capture is being done.
That way you could corelate which inputs caused which network traffic to be generated by matching the timestamps in the video to timestamps in the capture.
Will just network dumps be enough?
I'm don't know how current reversing efforts are being performed but I was wondering if it'll be enough.
Cause for example I can imagine it being extremely useful to have a recording of the software while a network capture is being done.
That way you could corelate which inputs caused which network traffic to be generated by matching the timestamps in the video to timestamps in the capture.