A New Method to Get MAC/NIC Statistical Information

Environment: Compiled on Visual Studio 6 & Windows XP Pro

Introduction:

In Khalid Shaikh's article, "Three ways to get your MAC address" (2002/04/15), he described three ways to retrieve a MAC address.

The first method is to use the relation between UUID and MAC to retrieve MAC. However, due to security reasons, UUID no longer contains an explicit MAC string. Thus, this method will not work anymore.

The second method is to use NetBIOS, of which Khalid Shaikh has described clearly the pros and cons.

The third method is to use the Windows SDK, which is very easy to use. Also along with MAC information, other configuration information can be retrieved in the same function call.

Due to project requirement, I need to find out a easy/neat way to not only get the configuration information of an interface, but also the dynamic statistic information: how many packages received/sent, how many packages dropped, and so forth. The methods described there cannot provide such information.

After doing some research, I found a good way to collect this information; the by-product is the MAC address.

Code

The code segment is quite straightforward. I only demonstrate how to retrieve MAC here. Check the reference for details of the MIB_IFROW structure if you need to collect the statistic information of NIC.

bool GetMacAddr()
{
  // Retrieve network interface information
  //

  DWORD sizeReq = 0 ;
  PMIB_IFTABLE pInfo = NULL;
  // Get size information
  ::GetIfTable(NULL, &sizeReq, FALSE) ;

  // Allocate required memory
  pInfo = (PMIB_IFTABLE) new BYTE [sizeReq] ;
  memset (pInfo, 0, sizeReq) ;

  DWORD sizeToUse = sizeReq ;

  // Retrieve network interface information
  bool result = ( ::GetIfTable( (PMIB_IFTABLE)pInfo,
       sizeToUse, FALSE) == NO_ERROR );
  if( !result )
  {
    delete (PMIB_IFTABLE)pInfo;
    pInfo = NULL;
    printf(
      "Couldn't retrieve network interface information!");
    return false;
  }

  // Print all interface information
  for( unsigned int index = 0; index <
    ((PMIB_IFTABLE)pInfo)->dwNumEntries; index ++ )
  {
    // Get interface description
    MIB_IFROW& details = ((PMIB_IFTABLE)pInfo)->table[index];
    printf("Interface %d: %s\n", index, (LPCTSTR) details.bDescr );

    // Is this an Ethernet interface?
    if( (details.dwPhysAddrLen == 6)
      && (details.dwType == MIB_IF_TYPE_ETHERNET) )
    {

      // Ethernet MAC address
      printf("     Ethernet: ");
    }
    else    // Other interface
    {
      printf("     Others: ");
    }

    // Format physical address
    char macStr[30];
    for (DWORD j = 0 ; j < details.dwPhysAddrLen ; ++j)
    {
      sprintf( &macStr[j*3], "%02X-", details.bPhysAddr[j] );
    }
    macStr[j*3-1] = '\0';

    // Print out physical address
    printf( "%s\n", &macStr[0] );
  }

  return true;
}

If you have any questions, don't hesitate to e-mail me.

Downloads

Download demo project and source (GetMAC) - 4 Kb
Note: This method uses Windows SDK, Thus, it requires that the Windows SDK be installed in order for it to be compiled.


Comments

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: June 23, 2015 Business transformation is not just important, it is vital to the success of all organizations in the 21st century marketplace. How IT approaches and executes the move from cost center to revenue contributor will not only transform the IT organization, it will change how companies retain competitive advantage and meet the requirements of internal and external customers. This shift in thinking is not new, but actualizing it is. Check out this eSeminar to learn the …

  • Do you spend a lot of time thinking about your enemies? Attacker attribution - figuring out who's out to get you - is one of the most important things an organization can do to protect itself.  Because you have no hope of defending yourself if you don't understand who the attackers are. Good news? Every organization isn't targeted by all the attackers. Bad news? No one can identify your potential attackers as well as you. Read this graphics-rich threat summary for 2014 to determine who might be your next …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date