This paper presents Packet Chasing, an attack on the network that does not require access to the network, which works regardless of the privilege level of the process receiving the packets. A spy process can easily probe and discover the exact cache location of each buffer used by the network driver. Even more useful, it can discover the exact sequence in which those buffers are used to receive packets. This then enables packet frequency and packet sizes to be monitored through existing cache side channels. This enables both covert channels between a sender and a remote spy with no access to the network, as well as direct attacks that can identify the web page access patterns of a victim on the network.