Quote:
Originally Posted by fredsmith
That seems to just be the watchlists for individual users.
|
I hope not, as that is the only JSON file I got during the entire trace, along with a bunch of javascript files from the same
http://project.abc.net.au
Code:
/assets/js/iview-watchlist.js
/assets/js/iview-filter.js
/assets/js/webtrends.load.iview.js
/assets/js/iview-main.js
and a couple of javascript gzips
potentially missed some
Also tried promiscuous mode while using the android app, either I don't have wireshark setup properly or there is no json sent to the android app (possibly just uses the html).
Unfortunately this is not going to be as easy as when the v2 api came out, I only needed URLsnooper2 for that
