• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 377
  • Last Modified:


I am testing the network security, I have installed Wireshark...i want to know how to sniff other PCs' traffic using my pc?
6 Solutions
Lee W, MVPTechnology and Business Process AdvisorCommented:
You can't sniff a switch unless it's a managed switch that has the ability to send all traffic to a monitoring port as well (the proper term eludes me at the moment).  If it's not a managed switch, then you need a hub to sniff things.

Switches direct traffic to specific ports and don't broadcast it to others.  Hubs, are essentially repeaters that should out everything they get to all the ports they have.  One is the correct one, the others aren't... but if a sniffer is on another, then you can sniff it.
Aaron TomoskyTechnology ConsultantCommented:
Well...you can arp poison but that causes it's own set of problems. I just wanted to clarify that you can't sniff a switch is really there isn't a good way to sniff a switch.
What leew is referring is called Port Mirroring that is you set up a port to mirror your uplink port (if you have one) and then you can sniff all the traffic using wireshark
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

ettercap may help you out in this case:
1. you may install ettercap (http://ettercap.sourceforge.net) on another PC;
2. use ettercap to sniff your network (of course the ettercap PC and your PC must be in the same network);
3. Then filter the result by using IP or mac address etc and see if any other PCs are trying to attack your PC.

Which switch are you using?
If you are looking for information regarding what goes to and from the Internet then the firewall/router's event log may help somewhat.

To capture the actual packets you would need to use port mirroring as mentioned above.

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now