Windows packet sniffer that can capture loopback traffic?

28,875

Solution 1

What you should do is to run RawCap, which is a sniffer that can capture traffic to/from the loopback interface in Windows. Just start it with "RawCap.exe 127.0.0.1 loopback.pcap".

You can then open up loopback.pcap in Wireshark or NetworkMiner to look at the network traffic.

You can find RawCap here: http://www.netresec.com/?page=RawCap

Good Luck!

Solution 2

I second the Microsoft Network Monitor (though this link works better at the time of writing) suggestion from Thomas Owens. Also, this post suggests that to get the loopback address, try doing:

route add <Your Machine's IP> <Your Router's IP>

This takes locally-generated packets for the local interface and sends them off to your router... which sends them back.

NOTE: To get your machine back to normal operation, make sure you delete the route when you're finished using:

route delete <Your Machine's IP>

Solution 3

There is a page on the Wireshark wiki that addresses the problem. Short answer is, you can't do it on a Windows machine, but there might be some workarounds.

Solution 4

I'm not sure if it can or not, but have you looked at Microsoft Network Monitor? It might be an option.

Solution 5

If you don't care to pay, try this: CommView

It seems to work, however the Evalution version doesn't display the complete packets.

Share:
28,875
Kofi
Author by

Kofi

Updated on November 12, 2020

Comments

  • Kofi
    Kofi over 3 years

    (This is a followup to my previous question about measuring .NET remoting traffic.)

    When I am testing our Windows service / service controller GUI combination, it is often most convenient to run both pieces on my development box. With this setup, the remoting traffic between the two is via loopback, not through the Ethernet card.

    Are there any software packet sniffers that can capture loopback traffic on a WinXP machine? Wireshark is a great package, but it can only capture external traffic on a Windows machine, not loopback.