winpkflt can’t filter using winpcap library?

Home Forums Discussions Support Portal winpkflt can’t filter using winpcap library?

This topic contains 3 replies, has 2 voices, and was last updated by  Vadim Smirnov 10 years, 2 months ago.

Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • #5130

    machun
    Participant

    we make firewall and using winpkflt.

    but some network attack tool made by winpcap library.

    so we want to block this packets. but now we can’t detect that packet. right?

    and…

    How we block that packet?

    #6427

    Vadim Smirnov
    Moderator

    but some network attack tool made by winpcap library.

    If network attack is performed from remote host to the system with WinpkFilter installed you will be able to intercept/block attacker packets sent with winpcap or anything else.

    If you want to block/inspect locally installed winpcap activities than this is also possible to do with simple extension of WinpkFilter (add winpcap to the list of hooked protocols in the NDIS hooking driver, NDIS IM build filters all protocols by default).

    #6428

    machun
    Participant

    @SerpentFly wrote:

    If you want to block/inspect locally installed winpcap activities than this is also possible to do with simple extension of WinpkFilter (add winpcap to the list of hooked protocols in the NDIS hooking driver, NDIS IM build filters all protocols by default).

    How can I do this?

    #6429

    Vadim Smirnov
    Moderator

    How can I do this?

    If you are asking about NDIS hooking driver modification then this can be done in your custom build by special request if you have got Developer license. If you have got the source code then you can do it yourself (the exact details can be queried from support(at)ntkernel.com).

Viewing 4 posts - 1 through 4 (of 4 total)

You must be logged in to reply to this topic.