On Sep 23, 2018, at 4:37 AM, Reznicencu Sergiu <[email protected]> 
wrote:

> I forgot to mention that I already recalculate the ip checksum. It is weird 
> that I cann see in wireshark the packets that I modified and resnt. Shouldn't 
> the packets be in "loopback"?

On most UN*Xes, yes; they will show up on the loopback interface (lo0 or lo).

On Windows, there isn't such an interface.  WinPcap doesn't capture that 
traffic; Npcap uses the Windows Filtering Platform:

        
https://docs.microsoft.com/en-us/windows/desktop/FWP/windows-filtering-platform-start-page

to capture internally looped-back traffic, and also can inject them using the 
Winsock Kernel interface

        
https://docs.microsoft.com/en-us/windows-hardware/drivers/network/introduction-to-winsock-kernel

but I don't know whether that will support what you're trying to do or not.
_______________________________________________
Winpcap-users mailing list
[email protected]
https://www.winpcap.org/mailman/listinfo/winpcap-users

Reply via email to