Windows forward packets to c# application Windows forward packets to c# application windows windows

Windows forward packets to c# application


using

netsh interface portproxy add v4tov4 listenport=9999 listenaddress=0.0.0.0 connectport=80 connectaddress=127.0.0.1

will redirect all requests to system registered IP addresses to localhost.

Firewall discards packets that do not match internal IP address list, the only way to capture such traffic is to set network card in promiscuous mode to capture all traffic by tool like wireshark.

My ideas:

  1. Dump all traffic to file (wireshark) and tail it to send to other host for processing.

  2. setup switch using port mirroring and have dedicated host for traffic analytics.

any comments welcome!

In the realm of computer networking, promiscuous mode refers to the special mode of Ethernet hardware, in particular network interface cards (NICs), that allows a NIC to receive all traffic on the network, even if it is not addressed to this NIC.