Kismet 2019-09-R4 releases: wireless network detector, sniffer, intrusion detection system
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode and can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.
It works on Linux, OSX, and, to a degree, Windows 10 under the WSL framework. On Linux, it works with most Wi-Fi cards, Bluetooth interfaces, and other hardware devices. On OSX it works with the built-in Wi-Fi interfaces, and on Windows 10 it will work with remote captures.
Kismet supports logging to the wtapfile packet format (readable by tcpdump and ethereal) and saves detected
network informat as plaintext, CSV, and XML. kismet is capable of using any GPS supported by gpsd and logs and
plots network data.
kismet is divided into three basic programs, kismet_server kismet_client, and gpsma.
Changelog 2019-09-R4
- This is a tiny bug fix on top of R1, R2, and R3; it has one important fix – fixing a false “login required” error on the datasources panel.
Copyright (C) 2017