Npcap is an update of WinPcap to NDIS 6 Light-Weight Filter (LWF) technique. It supports Windows Vista, 7, 8 and 10 . It is sponsored by the Nmap Project and developed by Yang Luo under Google Summer of Code 2013 and 2015 . It also received many helpful tests from Wireshark and NetScanTools .
Features
- NDIS 6 Support : Npcap makes use of new NDIS 6 Light-Weight Filter (LWF) API in Windows Vista and later (the legacy driver is used on XP). It's faster than the deprecated NDIS 5 API, which Microsoft could remove at any time.
- Extra Security : Npcap can be restricted so that only Administrators can sniff packets. If a non-Admin user tries to utilize Npcap through software such as Nmap or Wireshark, the user will have to pass a User Account Control (UAC) dialog to utilize the driver. This is conceptually similar to UNIX, where root access is generally required to capture packets.
- WinPcap Compatibility : If you choose
WinPcap Compatible Mode
at install-time, Npcap will use the WinPcap-style DLL directoriesc:\Windows\System32
npf
, allowing software built with WinPcap in mind to transparently use Npcap instead. If compatability mode is not selected, Npcap is installed in a different locationC:\Windows\System32\Npcap
npcap
so that both drivers can coexist on the same system. In this case, applications which only know about WinPcap will continue using that, while other applications can choose to use the newer and faster Npcap driver instead. - Loopback Packet Capture : Npcap is able to sniff loopback packets (transmissions between services on the same machine) by using the Windows Filtering Platform (WFP) . After installation, Npcap will create an adapter named
Npcap Loopback Adapter
for you. If you are a Wireshark user, choose this adapter to capture, you will see all loopback traffic the same way as other non-loopback adapters. Try it by typing in commands likeping 127.0.0.1
(IPv4) orping ::1
(IPv6). - Loopback Packet Injection : Npcap is also able to send loopback packets using the Winsock Kernel (WSK) technique. User-level software such as Nping can just send the packets out using
Npcap Loopback Adapter
just like any other adapter. Npcap then does the magic of removing the packet's Ethernet header and injecting the payload into the Windows TCP/IP stack. - Raw 802.11 Packet Capture : Npcap is able to see 802.11 packets instead of fake Ethernet packets on ordinary wireless adapters. You need to select the
Support raw 802.11 traffic (and monitor mode) for wireless adapters
option in the installation wizard to enable this feature. When your adapter is inMonitor Mode
, Npcap will supply all802.11 data + control + management
packets withradiotap
headers. When your adapter is inManaged Mode
, Npcap will only supply802.11 data
packets withradiotap
headers. Moreover, Npcap provides theWlanHelper.exe
tool to help you switch toMonitor Mode
on Windows. See more details about this feature in sectionFor softwares that use Npcap raw 802.11 feature
. See more details aboutradiotap
here: http://www.radiotap.org/
Documentation
Build
Run
installer\Build.bat
: build all DLLs and the driver. The DLLs need to be built using Visual Studio 2013 . And the driver needs to be built using Visual Studio 2015 with Windows SDK 10 10586 & Windows Driver Kit 10 10586 . Packaging
Run
installer\Deploy.bat
: copy the files from build directories to deployment directories and sign the files. Generate an installer named npcap-nmap-%VERSION%.exe
using NSIS large strings build with the SysRestore plug-in (special build for Npcap) and sign the installer. Generating debug symbols (optional)
Run
installer\Deploy_Symbols.bat
: copy the debug symbol files (.PDB) from build directories to deployment directories and package them into a zip file named npcap-nmap-<VERSION>-DebugSymbols.zip
using 7-Zip .
0 comentários:
Post a Comment
Note: Only a member of this blog may post a comment.