Closed ushkyr closed 6 years ago
Hi !
Could you post the result of
IFACES
In a scapy shell ?
hi, here it comes. with loopback driver uninstalled would show empty table headers
>>> from scapy.all import *
>>> ifaces
INDEX IFACE IP MAC
22 Адаптер замыкания на себя Microsoft KM_ 127.0.0.1 00:00:00:00:00:00
>>>
>>> conf
ASN1_default_codec = <ASN1Codec BER[1]>
AS_resolver = <scapy.as_resolvers.AS_resolver_multi instance at 0x029EB490>
BTsocket = <BluetoothRFCommSocket: read/write packets on a connected L2CAP...
L2listen = <L2pcapListenSocket: read packets at layer 2 using libpcap>
L2socket = <L2pcapSocket: read/write packets at layer 2 using only libpcap>
L3socket = <L3pcapSocket: read/write packets at layer 3 using only libpcap>
auto_crop_tables = True
auto_fragment = 1
cache_iflist = ['\\Device\\NPF_{C851219D-897B-4FA5-BE4A-24A55401F3F2}']
cache_ipaddrs = {'\\Device\\NPF_{C851219D-897B-4FA5-BE4A-24A55401F3F2}': '\x...
checkIPID = 0
checkIPaddr = 1
checkIPinIP = True
checkIPsrc = 1
check_TCPerror_seqack = 0
color_theme = <NoTheme>
commands = IPID_count : Identify IP id values classes in a list of packets...
contribs = {}
crypto_valid = False
crypto_valid_advanced = False
debug_dissector = 0
debug_match = 0
debug_tls = 0
default_l2 = <class 'scapy.packet.Raw'>
emph = <Emphasize []>
ethertypes = <ethertypes/ n_802_1AE n_802_AD>
except_filter = ''
extensions_paths = '.'
fancy_prompt = True
geoip_city = None
histfile = 'C:\\Users\\\xc0\xe4\xec\xe8\xed\xe8\xf1\xf2\xf0\xe0\xf2\xee\xf...
iface = <NetworkInterface Адаптер замыкания на себя Microsoft KM-TEST {...
iface6 = <NetworkInterface Адаптер замыкания на себя Microsoft KM-TEST {...
interactive = False
interactive_shell = ''
ipv6_enabled = True
l2types = 0x0 -> Loopback (Loopback) 0x1 <- Dot3 (802.3) 0x1 <-> Ether (E...
l3types = 0x3 -> IP (IP) 0x800 <-> IP (IP) 0x806 <-> ARP (ARP) 0x86dd <->...
layers = Packet : <member 'name' of 'Packet' objects> NoPayload : <membe...
load_layers = ['l2', 'inet', 'dhcp', 'dns', 'dot11', 'gprs', 'hsrp', 'inet6'...
logLevel = 30
manufdb = None
mib = <MIB/ roleOccupant id_ad_caRepository keyUsageRestriction EV_Ce...
min_pkt_size = 60
neighbor = Ether -> IPv6 Ether -> LLC Ether -> ARP Dot3 -> LLC Dot3 -> IP ...
netcache = arp_cache: 0 valid items. Timeout=120s in6_neighbor: 0 valid it...
noenum = <Resolve []>
padding = 1
padding_layer = <class 'scapy.packet.Padding'>
prog = cmd = 'C:\\Windows\\system32\\cmd.exe' cscript = 'C:\\Windows\\...
promisc = 1
prompt = '>>> '
protocols = <C:\Windows\system32\drivers\etc\protocol/ rvd udp ipv6_route g...
raw_layer = <class 'scapy.packet.Raw'>
raw_summary = False
resolve = <Resolve []>
route = Network Netmask Gateway Iface Output IP Metric 127.0.0.0 255.0....
route6 = Destination Next Hop Iface Src candidates Metric ::1/128 :: Ада...
services_tcp = <C:\Windows\system32\drivers\etc\services-tcp/ kpop efs knetd...
services_udp = <C:\Windows\system32\drivers\etc\services-udp/ ms_rome p2pgro...
session = ''
sniff_promisc = 1
stats_classic_protocols = [<class 'scapy.layers.inet.TCP'>, <class 'scapy.la...
stats_dot11_protocols = [<class 'scapy.layers.inet.TCP'>, <class 'scapy.laye...
stealth = 'not implemented'
temp_files = []
teredoPrefix = '2001::'
teredoServerPort = 3544
use_bpf = False
use_dnet = False
use_npcap = True
use_pcap = False
use_pypy = False
use_winpcapy = True
verb = 2
version = 'git-archive.dev617920fdd'
warning_threshold = 5
wepkey = ''
Well scapy only detects one single interface: the loopback one. Please check that you are connected to Internet :/
If you think there is a bug, please submit the result of the following commands in powershell:
Get-NetAdapter | select InterfaceDescription, InterfaceIndex, Name, InterfaceGuid, MacAddress, InterfaceAlias | fl
Get-WmiObject Win32_NetworkAdapter | select Name, InterfaceIndex, InterfaceDescription, GUID, MacAddress, NetConnectionID | fl
knocked off the loopback to check. ifaces returned empty table
>>> from scapy.all import *
>>> ifaces
INDEX IFACE IP MAC
>>>
installed scapy + npcap 0.99 r1 at windows server 2012 r2 attempted to sniff - only loopback activity tracked. tried pushing ethernet interface through:
same wtih loopback interface (22) works - scapy sniffs loopback activity.
also tried to push interface to conf by conf.iface='Citrix PV Network Adapter #0', use 'iface = 'Citrix PV Network Adapter #0' as sniff() parameter - all to no avail.
interfaces as seen from PowerShell