* A ncurses user interface.
* Network statistics to view the amount of packets and data in many
different protocols, interfaces and hosts.
* View what active TCP connections are on the network.
* View UDP packets.
* View and log ICMP packets.
* View and log the 48bit arp protocol.
And also view what make of network card is in each machine
* Multithreaded so that the user interface does not interfere with any of the packet
captureing methods.
* View and log the following user space protocols
FTP, POP3, HTTP
This article describes a sniffer for Windows. WinSniff is an application for capturing packets on the network. It displays all the packets that are transmitted on the local network and gives detailed information about each header in the packet. In order to keep it simple, I am not dealing with application level protocols. If you are interested, you can add features to support various application level protocols such as SMTP, FTP, NETBIOS etc
/*
This IPv4 example listens for incoming packets and automatically adds destinations
for new sources.
這個(gè)例子主要是讓大家了解下面3個(gè)函數(shù)的用法。
void OnNewSource(RTPSourceData *dat)
void OnBYEPacket(RTPSourceData *dat)
void OnRemoveSource(RTPSourceData *dat)
具體內(nèi)容看我的測(cè)試文檔吧。
例子的中文解釋都由hanyuejun添加,有任何疑問請(qǐng)發(fā)hanyuejun2006@163.com
*/
In this article, I will explain how to create UDP packets and then send them to a remote server through the Internet using WinPCap for Windows. The code has been tested to work with Windows XP SP2 and Vista SP1 on Linksys routers, and on Toshiba modems connected directly to the Internet. Please note that the code here is very minimalistic, and can be greatly expanded depending on your needs. The reason I use WinPCap in this article is that it solves the issue of Winsock for Windows (XP SP2 and above) not allowing raw UDP packets to be sent (in Linux, you can just use regular sockets). With WinPcap, it is possible to specify your own source IP and source hardware addresses in packets.