NDISAPI-RS is a Rust crate for interacting with the Windows Packet Filter driver. It provides an easy-to-use, safe, and efficient interface to efficiently filter (inspect and modify) raw network packets at the NDIS level of the network stack with minimal impact on network activity.
Windows Packet Filter (WinpkFilter) is a high-performance, lightweight packet filtering framework for Windows, enabling developers to efficiently inspect, modify, and control raw network packets at the NDIS level. With user-friendly APIs and support for various Windows versions, WinpkFilter simplifies network packet manipulation without requiring kernel-mode programming expertise.
Add the following to your Cargo.toml
file:
toml
[dependencies]
ndisapi-rs = "0.4.5"
Here's an example of how to enumerate network adapters and print their information:
```rust use ndisapi_rs::{MacAddress, Ndisapi};
fn main() { let ndis = Ndisapi::new("NDISRD").expect("Failed to create NdisApi instance");
let adapters = ndis
.get_tcpip_bound_adapters_info()
.expect("Failed to enumerate adapters");
for adapter in adapters {
println!("Adapter: {:?}", adapter.get_name());
println!(
"Description: {:?}",
Ndisapi::get_friendly_adapter_name(adapter.get_name()).unwrap_or("Unknown".to_string())
);
println!(
"MAC Address: {:?}",
MacAddress::from_slice(adapter.get_hw_address()).unwrap_or_default()
);
println!("-------------------------------");
}
} ```
For more examples and in-depth usage, check out the documentation.
Here is an example of how to run the listadapters
example:
``bash
PS D:\firezone\ndisapi> cargo run --example listadapters
Compiling ndisapi-rs v0.4.5 (D:\firezone\ndisapi)
Finished dev [unoptimized + debuginfo] target(s) in 3.22s
Running
target\debug\exampleslistadapters.exe`
Detected Windows Packet Filter version 3.4.3
1. Local Area Connection* 10
\DEVICE{EDEE8C42-F604-4A7B-BFAA-6B110923217E}
Medium: 0
MAC: 9A:47:3D:60:26:9D
MTU: 1500
FilterFlags: FilterFlags(0x0)
Getting OIDGENCURRENTPACKETFILTER Error: Data error (cyclic redundancy check).
OID8023CURRENTADDRESS: 9A:47:3D:60:26:9D
2. vEthernet (Default Switch)
\DEVICE{6FE04972-B2B5-4F5C-97E6-B8518A017192}
Medium: 0
MAC: 00:15:5D:91:A3:15
MTU: 1500
FilterFlags: FilterFlags(0x0)
OIDGENCURRENTPACKETFILTER: 0x0000000B
OID8023CURRENTADDRESS: 00:15:5D:91:A3:15
...
```
Following is the demonstration of the async-packthru example. For this scenario, we will assume that vEthernet (WLAN Virtual Switch)
is the default internet connection
``bash
PS D:\firezone\ndisapi> cargo run --example async-packthru -- --interface-index 12
Finished dev [unoptimized + debuginfo] target(s) in 0.11s
Running
target\debug\examples\async-packthru.exe --interface-index 12`
Detected Windows Packet Filter version 3.4.3
Using interface \DEVICE{05F9267C-C548-4822-8535-9A57F1A99DB7}
Interface --> MSTCP (93 bytes)
Ipv4 Address([142, 250, 102, 108]) => Address([192, 168, 3, 126])
MSTCP --> Interface (89 bytes)
Ipv4 Address([192, 168, 3, 126]) => Address([142, 250, 102, 108])
Interface --> MSTCP (60 bytes)
Ipv4 Address([142, 250, 102, 108]) => Address([192, 168, 3, 126])
Interface --> MSTCP (202 bytes)
Ipv4 Address([192, 168, 3, 105]) => Address([224, 0, 0, 251]) UDP 5353 -> 5353
Interface --> MSTCP (222 bytes)
Ipv6 Address([254, 128, 0, 0, 0, 0, 0, 0, 18, 44, 107, 255, 254, 84, 37, 126]) => Address([255, 2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 251])
Interface --> MSTCP (118 bytes)
Ipv4 Address([142, 250, 102, 108]) => Address([192, 168, 3, 126])
MSTCP --> Interface (115 bytes)
Ipv4 Address([192, 168, 3, 126]) => Address([142, 250, 102, 108])
Interface --> MSTCP (60 bytes)
Ipv4 Address([142, 250, 102, 108]) => Address([192, 168, 3, 126])
MSTCP --> Interface (74 bytes)
Ipv4 Address([192, 168, 3, 126]) => Address([158, 255, 51, 217])
Interface --> MSTCP (80 bytes)
Ipv4 Address([192, 168, 3, 105]) => Address([224, 0, 0, 251]) UDP 5353 -> 5353
Interface --> MSTCP (100 bytes)
Ipv6 Address([254, 128, 0, 0, 0, 0, 0, 0, 18, 44, 107, 255, 254, 84, 37, 126]) => Address([255, 2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 251]) UDP 5353 -> 5353
Shutting down... ```
This project is licensed under the Apache License 2.0. See LICENSE for details.