

- #WIRESHARK USB KEYBOARD KEYPRESSES SOFTWARE#
- #WIRESHARK USB KEYBOARD KEYPRESSES PASSWORD#
- #WIRESHARK USB KEYBOARD KEYPRESSES BLUETOOTH#
It might be possible on a laptop, but, in any case, you're going to need some way to grab the capture files from the machine.Īnd, in both that case and the other "capture network traffic" case, that won't be enough to decrypt encrypted Web traffic there will probably be a lot of that, and it's tricky, at best, to decrypt. That won't be possible on an Apple iPhone or iPad or iPod touch (Wireshark doesn't work on them, for various technical and Apple policy reasons, and neither do other sniffer programs). If the machine is portable, such as a smartphone, tablet, or laptop, the only way you're going to be able to completely monitor its use would be by installing a program on the machine and having it run continuously, capturing traffic while it's running. Capturing that would be tricky, though, if you didn't have the ability to turn the machine on and off.
#WIRESHARK USB KEYBOARD KEYPRESSES PASSWORD#
As for encryption, you would probably be able to decrypt traffic that's encrypted at the Wi-Fi level, by supplying the password for the network, IF you happen to capture the initial connection of her machine to the network. If, however, you want to watch the network traffic to and from her machine, see Jaap's comment you might be able to limit the traffic by finding out the MAC address of her machine, so you would only see that traffic. So that's going to be difficult at best and impossible at worst.
#WIRESHARK USB KEYBOARD KEYPRESSES BLUETOOTH#
If it's a wireless Bluetooth keyboard, that'd work only if you could tap the Bluetooth connection, which would only work on Linux and only work if you ran Wireshark on the machine to which the keyboard is communicating, or if you could do Bluetooth passive sniffing, which could only be done with Ubertooth hardware. Furthermore, you may get a lot of USB traffic that's not relevant to the keyboard. If it's a USB keyboard plugged into a personal computer, that'd work only if you could tap the USB connection, which can currently be done by Wireshark only by running it on the personal computer that currently only works if the machine is running Linux or Windows.
#WIRESHARK USB KEYBOARD KEYPRESSES SOFTWARE#
If the keyboard you're trying to monitor is a software keyboard on a smartphone or tablet, that won't work. Wireshark can only act as a keylogger, in the sense of a program that monitors keystrokes, if the keyboard being used is a hardware keyboard that connects to a host over a network that Wireshark can sniff.
