Reputation: 457
I'm writing a UDP send program which will send data to 127.0.0.1, port 5000.
When I use Wireshark to sniff my data packet, it interprets the protocol as TAPA protocol, which is unexpected. What I was expecting is that Wireshark treats the data packet as a general UDP data packet and display the payload data, not to parse it as a TAPA datagram.
Upvotes: 0
Views: 743
Reputation: 211710
Wireshark, like many dumping tools, will attempt to interpret the data it receives using a number of fingerprinting strategies.
If your data looks sufficiently like that protocol, or shares a port that's commonly used for that sort of traffic, it may be inadvertently tagged as such.
Port 5000 is quite a non-random number to use. Why not something else?
Upvotes: 1