[Winpcap-users] Sending packets to own NIC

Guy Harris guy at alum.mit.edu
Sun Sep 23 17:20:29 UTC 2018


On Sep 23, 2018, at 4:37 AM, Reznicencu Sergiu <sergiureznicencu at gmail.com> wrote:

> I forgot to mention that I already recalculate the ip checksum. It is weird that I cann see in wireshark the packets that I modified and resnt. Shouldn't the packets be in "loopback"?

On most UN*Xes, yes; they will show up on the loopback interface (lo0 or lo).

On Windows, there isn't such an interface.  WinPcap doesn't capture that traffic; Npcap uses the Windows Filtering Platform:

	https://docs.microsoft.com/en-us/windows/desktop/FWP/windows-filtering-platform-start-page

to capture internally looped-back traffic, and also can inject them using the Winsock Kernel interface

	https://docs.microsoft.com/en-us/windows-hardware/drivers/network/introduction-to-winsock-kernel

but I don't know whether that will support what you're trying to do or not.


More information about the Winpcap-users mailing list