First time here? Check out the FAQ!
THIS IS A TEST INSTANCE. Feel free to ask and answer questions, but take care to avoid triggering too many notifications.
0

Sniffing traffic from port 9000 (Listener)

  • retag add tags

Hi,

I have an App called Listener running on Port 9000. When I sniff the traffic I can see this line which is what the Listener App reflects on the screen:

helper|xmlrpt||ACONNEX^Courier New^8.00^2|/u1/SPL/ACO352AE.xml|1|||N|N

If I do a telnet to Port 9000 and copy and paste the line below it'll not give me the expected result in the App.

Is there anything that Wireshark can tell me about that session which I may have missed ?

gfremaint's avatar
1
gfremaint
asked 2018-12-19 19:44:20 +0000
edit flag offensive 0 remove flag close merge delete

Comments

For sending ascii I might suggest trying a different tool like netcat, socat, or the like.

Bob Jones's avatar Bob Jones (2018-12-20 11:04:13 +0000) edit
add a comment see more comments

1 Answer

0

Snif your telnet action also (including connection and disconnection) and compare the captures. Wireshark shows you, up to the bit level, what the exchanges are.

Jaap's avatar
13.7k
Jaap
answered 2018-12-20 07:07:05 +0000
edit flag offensive 0 remove flag delete link

Comments

add a comment see more comments

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account. This space is reserved only for answers. If you would like to engage in a discussion, please instead post a comment under the question or an answer that you would like to discuss.

Add Answer