On Sep 23, 2018, at 4:37 AM, Reznicencu Sergiu <[email protected]>
wrote:
> I forgot to mention that I already recalculate the ip checksum. It is weird
> that I cann see in wireshark the packets that I modified and resnt. Shouldn't
> the packets be in "loopback"?
On most UN*Xes, yes; they will show up on the loopback interface (lo0 or lo).
On Windows, there isn't such an interface. WinPcap doesn't capture that
traffic; Npcap uses the Windows Filtering Platform:
https://docs.microsoft.com/en-us/windows/desktop/FWP/windows-filtering-platform-start-page
to capture internally looped-back traffic, and also can inject them using the
Winsock Kernel interface
https://docs.microsoft.com/en-us/windows-hardware/drivers/network/introduction-to-winsock-kernel
but I don't know whether that will support what you're trying to do or not.
_______________________________________________
Winpcap-users mailing list
[email protected]
https://www.winpcap.org/mailman/listinfo/winpcap-users