Wireshark dissector useful to analyze 32100 UDP protocol
Copy 32100_dissector.lua in Wireshark's plugin directory (try subdirectories like wireshark or
Alternatively run run Wireshark from command line like this:
wireshark -X lua_script:32100_dissector.lua
The dissector should automatically handle packets sent to or from UDP port 32100
You can use filters like
32100
to display only protocol's packet or32100.known == false
to check messages still not known32100.type == 0x20
to only show specific type of messagesSince the communication between devices and apps (and relay servers) goes through other ports than 32100, the packet dissection is not handled automatically.
However, you can force Wireshark to dissect them by manually selecting the protocol.
Right-click on a packet and select Decode as...
In current
drop-down menu pick 32100
All packets exchanged through the same port are now interpreted as 32100 protocol. Repeat with all missing packets on different ports.
Contributes of any kind are welcome.
Please report unknown types in order to increase the protocol's coverage