Ask Your Question

Sniffing traffic from port 9000 (Listener)

asked 2018-12-19 19:44:20 +0000


I have an App called Listener running on Port 9000. When I sniff the traffic I can see this line which is what the Listener App reflects on the screen:

helper|xmlrpt||ACONNEX^Courier New^8.00^2|/u1/SPL/ACO352AE.xml|1|||N|N

If I do a telnet to Port 9000 and copy and paste the line below it'll not give me the expected result in the App.

Is there anything that Wireshark can tell me about that session which I may have missed ?

edit retag flag offensive close merge delete


For sending ascii I might suggest trying a different tool like netcat, socat, or the like.

Bob Jones gravatar imageBob Jones ( 2018-12-20 11:04:13 +0000 )edit

1 Answer

Sort by ยป oldest newest most voted

answered 2018-12-20 07:07:05 +0000

Jaap gravatar image

Snif your telnet action also (including connection and disconnection) and compare the captures. Wireshark shows you, up to the bit level, what the exchanges are.

edit flag offensive delete link more

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account.

Add Answer

Question Tools

1 follower


Asked: 2018-12-19 19:44:20 +0000

Seen: 492 times

Last updated: Dec 20 '18