This is a static archive of our old Q&A Site. Please post any new questions and answers at

sniffing another PC’s ?!


can i start sniffing another pc's packets without a LAN connection , maybe through remote network programs such as "hamachi" ?

P.S. how can i see information which are encrypted (like accounts info , mmpor games actually ) ?

asked 01 May '12, 05:17

kimocool's gravatar image

accept rate: 0%

2 Answers:


No, you can't, unless you're able to use some tricks like ARP cache poisoning which might or might not work on a connection like hamachi.

BTW: Basically, your way of asking your question indicates that you're trying to find ways to spy on other people's data communications (and credentials). Besides being rude it is also illegal in most countries, so you better be VERY careful. Or to say it in other words: stop thinking about it.

answered 01 May '12, 16:35

Jasper's gravatar image

Jasper ♦♦
accept rate: 18%

edited 01 May '12, 16:36

thank you mr.Jasper for your answer , but i wish further assistant . P.S. i truly have spying intentions but not for stealing people's data , sometimes you'll have to make sure that your own daughter is well behaving on social websites ( you know what i mean )

(02 May '12, 01:49) kimocool

Okay, I understand your motivation - I still think it would be better to have a good talk with her to make sure she knows what's safe/off limits and what isn't :-)

Anyway, even if you could capture the traffic you probably will not be able to see account info etc since encryption is exactly meant to keep others from reading what's going on. So unless you have decryption keys Wireshark can't help even IF you manage to capture the data (and to get those keys you usually need administrative access to the server she's working with)

(02 May '12, 02:11) Jasper ♦♦

I don't think a sniffer is a good choice here. You will not be able to monitor what your daughter is doing, as soon as the website offers/uses SSL/TLS. Furthermore you will need a lot of experience (sniffer, protocols) to analyze the traffic. However, based on your question, I assume this technology ist quite new to you.

I suggest to look for parental control software to keep an eye on your daughters activities.


(02 May '12, 03:03) Kurt Knochner ♦

I did not mention "parental control software" because as far as my experience with that kind of software goes it is very likely that the parents are usually much less experienced in setting it up than their kids are in getting around it :-D

(02 May '12, 03:06) Jasper ♦♦

hehehe you know ... i've tried what people call "key logger" , it used to send keystrokes to my G-mail ,when i logged in my gmail ,i found a "don't try to mess with me" message and no any other msgs , i guess i was uncovered ... anyway , i'll try to find another way as i see decrypting packets looks like impossible ( is it ? ), thank you Jasper and Kurt for your assistant.

(02 May '12, 07:47) kimocool

--- "don't try to mess with me"

THAT came from your daugther?? Well, if she is that clever (and detected your keylogger), you better ask HER how to sniff on her "social network traffic".

Decrypting packets would be impossible in your "scenario".

(02 May '12, 07:52) Kurt Knochner ♦
showing 5 of 6 show 1 more comments


Firstly, if you want to see if she logs in, wipe the auto-fill on the form to sign in to the website, then go back later and type in one of every letter until it tries to guess. I catch people that way all the time for more serious things.

The connections tell you a lot, too, and just because the browser window isn't open doesn't mean the connections don't linger. Running "netstat -a -v" in CMD/terminal/command-prompt will sometimes reveal connections kept alive after being disconnected. Facebook connections are https and almost always have an "f" in the name. Here's an example where I had signed off for an entire day, but the connection still showed: "channel-ecmp-06-f:https CLOSE_WAIT" (I like to sit and watch this kind of thing sometimes)

You can password protect your computer's log folder. Select permissions that allow system access, but not user access without the key. Computers are basically just giant logging/tracking machines. lol

Just my experiences and observations over the years. =)

answered 30 Aug '13, 04:09

AdrianThePhotog's gravatar image

accept rate: 0%