[Winpcap-users] Sending packets to own NIC
    Guy Harris 
    guy at alum.mit.edu
       
    Sun Sep 23 17:20:29 UTC 2018
    
    
  
On Sep 23, 2018, at 4:37 AM, Reznicencu Sergiu <sergiureznicencu at gmail.com> wrote:
> I forgot to mention that I already recalculate the ip checksum. It is weird that I cann see in wireshark the packets that I modified and resnt. Shouldn't the packets be in "loopback"?
On most UN*Xes, yes; they will show up on the loopback interface (lo0 or lo).
On Windows, there isn't such an interface.  WinPcap doesn't capture that traffic; Npcap uses the Windows Filtering Platform:
	https://docs.microsoft.com/en-us/windows/desktop/FWP/windows-filtering-platform-start-page
to capture internally looped-back traffic, and also can inject them using the Winsock Kernel interface
	https://docs.microsoft.com/en-us/windows-hardware/drivers/network/introduction-to-winsock-kernel
but I don't know whether that will support what you're trying to do or not.
    
    
More information about the Winpcap-users
mailing list