windows capture packets RawCap local loop network in the

First, download address:

Official website address: https: //www.netresec.com/ page = RawCap?

Baidu Cloud: link: https: //pan.baidu.com/s/1mWCOTRF5XicuJitBAVQH7g
extraction code: 03lh

Second, use:

cmd command RawCap.exe the following lines:

D: \ rawcap> RawCap.exe
Interfaces:
 of 0. The 127.0.0.1 Npcap the Loopback Adapter the Loopback
 1. 192.168.0.104 local connection Ethernet
 2. 127.0.0.1 the Loopback Pseudo-Interface. 1 the Loopback
the Select interface to sniff [default '0']: 0    // select monitor network interface 0


Path or filename the Output [default 'dumpfile.pcap']: 127.pcap    // Custom pcap file name


IP sniffing: 127.0.0.1
File: 127.pcap
Packets: 48 ^ C // Ctrl + C End

or

Direct execution: RawCap.exe 0 127.pcap

Third, file generation:

After the software is generated in the same directory RawCap.exe 127.pcap file.

 

Guess you like

Origin www.cnblogs.com/frisk/p/11519514.html