Hi Parscal,

I think I have added the "flpp4" and "flpp6" to Npcap, but I don't know if
this works, you could try latest installer:
https://svn.nmap.org/nmap-exp/yang/NPcap-LWF/npcap-nmap-0.02-r3.exe

On Thu, Jul 23, 2015 at 4:18 PM, Pascal Quantin <pascal.quan...@gmail.com>
wrote:

>
>
> 2015-07-22 21:39 GMT+02:00 Pascal Quantin <pascal.quan...@gmail.com>:
>
>>
>>
>> 2015-07-22 18:25 GMT+02:00 Yang Luo <hslu...@gmail.com>:
>>
>>> Hi Pascal,
>>>
>>> On Wed, Jul 22, 2015 at 11:33 PM, Pascal Quantin <
>>> pascal.quan...@gmail.com> wrote:
>>>
>>>>
>>>> I just gave a try to this new installer:
>>>> - still my rename issue of the loop back installer (as expected ;)). Is
>>>> there some debug log / test I could do on my side? I will double check if
>>>> the rename works fine on a French Win 7.
>>>>
>>> I think I perhaps know why this doesn't work on your French Win10. It
>>> can be language related. Because the Win10 renaming way uses string parsing
>>> again. This is the mechanism:
>>> 1) First Npcap runs "netsh.exe interface show interface" to get all
>>> interfaces before install "Npcap Loopback Adapter", you will get something
>>> like below in English language (but I don't know if my code adapts to
>>> French, this is the key point).
>>> Admin State    State          Type             Interface Name
>>> -------------------------------------------------------------------------
>>> Enabled        Connected      Dedicated        VMware Network Adapter
>>> VMnet1
>>> Enabled        Connected      Dedicated        VMware Network Adapter
>>> VMnet8
>>> Enabled        Connected      Dedicated        VMware Network Adapter
>>> VMnet2
>>> Enabled        Connected      Dedicated        VMware Network Adapter
>>> VMnet3
>>> Enabled        Connected      Dedicated        Wi-Fi
>>> Disabled       Disconnected   Dedicated        Ethernet
>>>
>>> Npcap will parse this output to get all interface names, the method is
>>> first going to the third line, then find the line feed char '\n', if '\n'
>>> found, then reverse-find the two continuous space char "  ". Then we can
>>> get a name like "VMware Network Adapter VMnet1", the same for other names.
>>> Save them to a vector<string>.
>>>
>>> 2) After "Npcap Loopback Adapter" installed, Npcap will run "netsh.exe
>>> interface show interface" again, to get the updated interface list, like
>>> below:
>>> Admin State    State          Type             Interface Name
>>> -------------------------------------------------------------------------
>>> Enabled        Connected      Dedicated        VMware Network Adapter
>>> VMnet1
>>> Enabled        Connected      Dedicated        VMware Network Adapter
>>> VMnet8
>>> Enabled        Connected      Dedicated        VMware Network Adapter
>>> VMnet2
>>> Enabled        Connected      Dedicated        VMware Network Adapter
>>> VMnet3
>>> Enabled        Connected      Dedicated        Wi-Fi
>>> Disabled       Disconnected   Dedicated        Ethernet
>>> Enabled        Connected      Dedicated        Ethernet 2
>>>
>>> We can get another vector<string> from above output, compare these two
>>> vectors, find the new name, which is "Ethernet 2".
>>>
>>> 3) Then Npcap will rename this new adapter using "netsh.exe interface
>>> set interface name=\"%s\" newname=\"%s\", the first %s is previous
>>> "Ethernet 2", and the second %s is "Npcap Loopback Adapter".
>>>
>>> So I think this way possibly fail in a different language system than
>>> English, because the output of "netsh.exe interface show interface" can be
>>> language specific. You can try these commands manually to see whether this
>>> method works.
>>>
>>
>> Indeed the command output is localized. Before installing Npcap, I have:
>> État admin    État          Type            Nom de l'interface
>> -------------------------------------------------------------------------
>> Activé         Connecté       Dédié            Ethernet
>>
>> After the installation, I have:
>> État admin    État          Type            Nom de l'interface
>> -------------------------------------------------------------------------
>> Activé         Connecté       Dédié            Ethernet
>> Activé         Connecté       Dédié            Ethernet 2
>>
>> Executing manually the command netsh.exe interface set interface
>> name="Ethernet 2" newname="Npcap Loopback Adapter"
>> does work.
>>
>>
>>> - driver can be started after reboot (manually or with Wireshark)
>>>>
>>> Good for this.
>>>
>>>
>>>> - for those having User Account Control activated, you need to start
>>>> Wireshark as administrator (even without restricting Npcap to admin during
>>>> installation) to have the driver started. Unfortunate... If this is the
>>>> loopback adapter that triggers the issue at startup, should its
>>>> installation be optional?
>>>>
>>> I don't know whether there are many people using Wireshark in a
>>> non-Admin privilege? If yes, then I think the lacking boot start support
>>> needs a solution. Making loopback code optional is kind of difficult,
>>> because its code is deep in the driver and has tight connection with other
>>> parts.
>>>
>>>
>>>> - I finally got the opportunity to test with a MBIM WWAN device (long
>>>> due task on my side ;)). The interface is not listed unfortunately.
>>>>
>>> This is weird, because in the driver's INF file, I have specified:
>>> HKR, Ndi\Interfaces, FilterMediaTypes,,"ethernet, wan, ppip, wlan,
>>> bluetooth, ndis5, vwifi, nolower"
>>> It should have includes WAN interfaces. Perhaps you would like to find
>>> out if this WAN device has appeared in registry, because Npcap or WinPcap
>>> only sees interfaces that appears in registry, registry path is:
>>> \\HKLM\\System\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}.
>>>
>>
>> I will try to get my hands on the PC again (gave it back to my colleague)
>> to verify this.
>>
>>
>
> I got access to the PC. There are 2 Mobile Broadband interfaces being
> listed on the PC and not seen by Npcap. You will find attached the
> corrresponding registry key dumps.
>
> Cheers,
> Pascal.
>
>
>>>
>>> Cheers,
>>> Yang
>>>
>>>
>>>
>>> ___________________________________________________________________________
>>> Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
>>> Archives:    https://www.wireshark.org/lists/wireshark-dev
>>> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>>>              mailto:wireshark-dev-requ...@wireshark.org
>>> ?subject=unsubscribe
>>>
>>
>>
>
> ___________________________________________________________________________
> Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
> Archives:    https://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>              mailto:wireshark-dev-requ...@wireshark.org
> ?subject=unsubscribe
>
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Reply via email to