Sniffing traffic from port 9000 (Listener)
Hi,
I have an App called Listener running on Port 9000. When I sniff the traffic I can see this line which is what the Listener App reflects on the screen:
helper|xmlrpt||ACONNEX^Courier New^8.00^2|/u1/SPL/ACO352AE.xml|1|||N|N
If I do a telnet to Port 9000 and copy and paste the line below it'll not give me the expected result in the App.
Is there anything that Wireshark can tell me about that session which I may have missed ?
For sending ascii I might suggest trying a different tool like netcat, socat, or the like.