1 2 3 4 5
implement communication protocol security analysis implement sniffer (last step) security analysis code cleanup