[Winpcap-users] Sending packets to own NIC
Guy Harris
guy at alum.mit.edu
Sun Sep 23 17:20:29 UTC 2018
On Sep 23, 2018, at 4:37 AM, Reznicencu Sergiu <sergiureznicencu at gmail.com> wrote:
> I forgot to mention that I already recalculate the ip checksum. It is weird that I cann see in wireshark the packets that I modified and resnt. Shouldn't the packets be in "loopback"?
On most UN*Xes, yes; they will show up on the loopback interface (lo0 or lo).
On Windows, there isn't such an interface. WinPcap doesn't capture that traffic; Npcap uses the Windows Filtering Platform:
https://docs.microsoft.com/en-us/windows/desktop/FWP/windows-filtering-platform-start-page
to capture internally looped-back traffic, and also can inject them using the Winsock Kernel interface
https://docs.microsoft.com/en-us/windows-hardware/drivers/network/introduction-to-winsock-kernel
but I don't know whether that will support what you're trying to do or not.
More information about the Winpcap-users
mailing list