Nmap Development mailing list archives
Yang's Status Report - #10 of 17
From: 食肉大灰兔V5 <hsluoyz () gmail com>
Date: Tue, 7 Jul 2015 00:01:34 +0800
Hi list, Accomplishments * Bug Fix: Added more adapter types to inf file's FilterMediaTypes, fixed the bug that NPcap can't list bluetooth adapters and VMware Network Adapters (VMnetX). Now NPcap lists the same adapters with WinPcap. https://github.com/nmap/npcap/commit/d4328e48e50a4e4619dbcc6fab94064ccc165f5f * Bug Fix: Changed the adapter names NPcap returned to user softwares from "\Device\NPCAP_{XXX}" to original WinPcap's "\Device\NPF_{XXX}" form. This is for compatibility, because Wireshark has hard-coded the adapter names to "NPF_", which leads to interface names show abnormal. https://github.com/nmap/npcap/commit/a23f1d634da228a90e8925d1b1d045e8d7fa981d * Plan: to make NPcap support loopback packets capturing on Windows. http://seclists.org/nmap-dev/2015/q3/35 * New Feature: Add "Add Windows Loopback Adapter" feature for NPFInstall.exe, we call this adapter "NPcap Loopback Adapter". use "-il" to install and "-ul" to uninstall. This adapter is for NPcap's loopback packets capturing, when user captures under this adapter, he will get the "real" loopback packets (like ping 127.0.0.1 or any local IPs) instead of the Windows-predesigned adapter traffic, other loopback adapters are not infected by this feature. https://github.com/nmap/npcap/commit/7a1b95ae03a92309bf87ce1f7e87ef3ba63383e2 * New Feature: Made a simple WFP driver named "lbtest.sys" which successfully sees the loopback traffic. This code will be integrated into NPcap driver when it's finished. https://svn.nmap.org/nmap-exp/yang/NPcap-LWF/lbtest/ * New Feature: NPFInstall.exe supports renaming our loopback adapter to "NPcap Loopback Adapter" now, but this is not the network name, we need to find a way to rename the network in ncpa.cpl, because that name is used more often. https://github.com/nmap/npcap/commit/6844caae08420d99fb2552d75f96fd02d29f8d28 * Improvement: Improved the NPFInstall.exe logic to get the Device Instance ID of our installed adapter. https://github.com/nmap/npcap/commit/51e1d4e7516894d11d55851a1d0ede27829ad159 Priorities * Work on loopback traffic capturing. * Have a meeting with Fyodor for the next step. Cheers, Yang
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Yang's Status Report - #10 of 17 食肉大灰兔V5 (Jul 06)