Nmap Development mailing list archives

Yang's Status Report - #10 of 17


From: 食肉大灰兔V5 <hsluoyz () gmail com>
Date: Tue, 7 Jul 2015 00:01:34 +0800

Hi list,

Accomplishments
 * Bug Fix: Added more adapter types to inf file's FilterMediaTypes, fixed
the bug that NPcap can't list bluetooth adapters and VMware Network
Adapters (VMnetX). Now NPcap lists the same adapters with WinPcap.
https://github.com/nmap/npcap/commit/d4328e48e50a4e4619dbcc6fab94064ccc165f5f

 * Bug Fix: Changed the adapter names NPcap returned to user softwares from
"\Device\NPCAP_{XXX}" to original WinPcap's "\Device\NPF_{XXX}" form. This
is for compatibility, because Wireshark has hard-coded the adapter names to
"NPF_", which leads to interface names show abnormal.
https://github.com/nmap/npcap/commit/a23f1d634da228a90e8925d1b1d045e8d7fa981d

 * Plan: to make NPcap support loopback packets capturing on Windows.
http://seclists.org/nmap-dev/2015/q3/35

 * New Feature: Add "Add Windows Loopback Adapter" feature for
NPFInstall.exe, we call this adapter "NPcap Loopback Adapter". use "-il" to
install and "-ul" to uninstall. This adapter is for NPcap's loopback
packets capturing, when user captures under this adapter, he will get the
"real" loopback packets (like ping 127.0.0.1 or any local IPs) instead of
the Windows-predesigned adapter traffic, other loopback adapters are not
infected by this feature.
https://github.com/nmap/npcap/commit/7a1b95ae03a92309bf87ce1f7e87ef3ba63383e2

 * New Feature: Made a simple WFP driver named "lbtest.sys" which
successfully sees the loopback traffic. This code will be integrated into
NPcap driver when it's finished.
https://svn.nmap.org/nmap-exp/yang/NPcap-LWF/lbtest/

 * New Feature: NPFInstall.exe supports renaming our loopback adapter to
"NPcap Loopback Adapter" now, but this is not the network name, we need to
find a way to rename the network in ncpa.cpl, because that name is used
more often.
https://github.com/nmap/npcap/commit/6844caae08420d99fb2552d75f96fd02d29f8d28

 * Improvement: Improved the NPFInstall.exe logic to get the Device
Instance ID of our installed adapter.
https://github.com/nmap/npcap/commit/51e1d4e7516894d11d55851a1d0ede27829ad159



Priorities
 * Work on loopback traffic capturing.
 * Have a meeting with Fyodor for the next step.

Cheers,
Yang
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: