How does one display/visualize a trace of a session with ANSI Escape codes embedded in it?
I have a tshark trace of a telnet session to a HP switch. From that, I Follow TCP Stream and get a pseudo-text representation of the telnet session (with embedded escape chars).
less hptelnet.escape
can be used to display it, but that breaks down quickly as the file gets just slightly bigger.
I've concocted a quick script that makes it sort of readable but it is far from finished. The ANSI escape sequences are just not simple.
Does anybody have any better ideas as to how one can view the "contents" of such a telnet trace?