1 | initial version |
As noted in your previous question, you can't simply throw strings at a listening service and expect anything good to come if it. Port 139 is used for the Netbios Session Service (NBSS) and unless you're intending to emulate a Windows NBSS client on your FRDM board is of no use to you at all.
For echotool help run echotool /?
That shows you need to use /p tcp /s <my port>
to make it listen on a port of your choice. Choose a port > 49152 as that's likely to be unused. You may have to add a firewall rule (or turn off the firewall if you don't care about security) to allow echotool to receive packets external to the pc. Configure your FRDM board to use the same port as echotool is listening on.
You should really look for support in a forum for your board or software stack. This isn't a Wireshark question and is really off-topic for this site.
2 | No.2 Revision |
As noted in your previous question, you can't simply throw strings at a listening service and expect anything good to come if it. Port 139 is used for the Netbios Session Service (NBSS) and unless you're intending to emulate a Windows NBSS client on your FRDM board is of no use to you at all.
You can't simply run other tools on ports that are already in use.
For echotool help run echotool /?
That shows you need to use /p tcp /s <my port>
to make it listen on a port of your choice. Choose a port > 49152 as that's likely to be unused. You may have to add a firewall rule (or turn off the firewall if you don't care about security) to allow echotool to receive packets external to the pc. Configure your FRDM board to use the same port as echotool is listening on.
You should really look for support in a forum for your board or software stack. This isn't a Wireshark question and is really off-topic for this site.