Stable release | 0.3.4 (Alpha 4) / September 2015; 5 years ago[1] |
---|---|
Operating system | Mac OS X |
Type | Wi-Fi tool |
License | GPL |
Website | https://github.com/IGRSoft/KisMac2 (Kismac2)https://kismac-ng.org/ (Kismac original) |
KisMAC – a WiFi scanner for your Mac Free and open-source program helps you collect essential information about surrounding WiFi networks. KisMAC WiFi scanner app can detect SSIDs, shows you the logged in clients, allows you to sketch WiFi maps, and more! Download KisMAC 2 source code. Newer Macs with Airport Extreme cards are a problem for KisMAC. The Airport Extreme is an 802.11g radio based on a chipset from Broadcom. Broadcom does not publish details on their chipsets, so it is impossible for open source projects to write supporting drivers. This is a bigger problem than just network monitors for Mac OS X.
KisMAC is a wireless network discovery tool for Mac OS X. It has a wide range of features, similar to those of Kismet (its Linux/BSD namesake). The program is geared toward network security professionals, and is not as novice-friendly as similar applications. Distributed under the GNU General Public License,[2] KisMAC is free software.
Oct 08, 2017 Alternatives to KisMAC for Windows, Mac, Linux, Android, iPhone and more. Filter by license to discover only free or Open Source alternatives. This list contains a total of 23 apps similar to KisMAC. List updated: 10/8/2017 1:51:00 PM. KisMAC is an open-source and free sniffer/scanner application for Mac OS X. It has an advantage over MacStumbler / iStumbler / NetStumbler in that it uses monitor mode and passive scanning.
KisMAC will scan for networks passively on supported cards - including Apple's AirPort, and AirPort Extreme, and many third-party cards, and actively on any card supported by Mac OS X itself.
Cracking of WEP and WPA keys, both by brute force, and exploiting flaws such as weak scheduling and badly generated keys is supported when a card capable of monitor mode is used, and packet reinjection can be done with a supported card (Prism2 and some Ralink cards). GPS mapping can be performed when an NMEA compatible GPS receiver is attached.[3]
Kismac2 is a fork of the original software with a new GUI, new features and that works for OS X 10.7 - 10.10, 64-bit only. It is no longer maintained.
Data can also be saved in pcap format and loaded into programs such as Wireshark.
KisMAC Features[edit]
- Reveals hidden / cloaked / closed SSIDs
- Shows logged in clients (with MAC Addresses, IP addresses and signal strengths)
- Mapping and GPS support
- Can draw area maps of network coverage
- PCAP import and export
- Support for 802.11b/g
- Different attacks against encrypted networks
- Deauthentication attacks
- AppleScript-able
- Kismet drone support (capture from a Kismet drone)
KisMAC and Germany[edit]
The project was created and led by Michael Rossberg until July 27, 2007, when he removed himself from the project due to changes in German law (specifically, StGB Section 202c) that 'prohibits the production and distribution of security software'.[4] On this date, project lead was passed on to Geoffrey Kruse, maintainer of KisMAC since 2003, andactive developer since 2001. KisMAC is no longer being actively being developed.[citation needed] Primary development, and the relocated KisMAC web site were offline as of September 2016. As of August 6, 2007, the former homepage now denounces the new German law.
KisMac2 was project to continue development but is no longer maintained as well.
See also[edit]
References[edit]
- ^KisMAC2 0.3.4 Changes
- ^'Under What License is KisMAC Published?'. kismac-ng.org. Archived from the original on 2008-03-03. Retrieved 2008-02-22.
- ^'gpsd — a GPS service daemon'. berlios.de. Archived from GPSd the original Check
|url=
value (help) on 2008-02-12. Retrieved 2008-02-22. - ^'Germany says goodbye KisMAC!'. kismac.de. Retrieved 2008-02-22.
External links[edit]
Retrieved from 'https://en.wikipedia.org/w/index.php?title=KisMAC&oldid=978627827'
Developer(s) | Mike Kershaw (dragorn) |
---|---|
Stable release | 2020-04-R3[1] / May 2, 2020; 5 months ago |
Repository | |
Written in | C++ |
Operating system | Cross-platform |
Type | Packet Sniffer |
License | GPL |
Website | www.kismetwireless.net |
Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic. The program runs under Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. The client can also run on Microsoft Windows, although, aside from external drones (see below), there's only one supported wireless hardware available as packet source.
Distributed under the GNU General Public License,[2] Kismet is free software.
Features[edit]
Kismet differs from other wireless network detectors in working passively. Namely, without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients, and to associate them with each other. It is also the most widely used and up to date open source wireless monitoring tool.[citation needed]
An explanation of the headings displayed in Kismet.
Kismet also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks.
Kismet features the ability to log all sniffed packets and save them in a tcpdump/Wireshark or Airsnort compatible file format. Kismet can also capture 'Per-Packet Information' headers.
Kismet also features the ability to detect default or 'not configured' networks, probe requests, and determine what level of wireless encryption is used on a given access point.
In order to find as many networks as possible, Kismet supports channel hopping. This means that it constantly changes from channel to channel non-sequentially, in a user-defined sequence with a default value that leaves big holes between channels (for example, 1-6-11-2-7-12-3-8-13-4-9-14-5-10). The advantage with this method is that it will capture more packets because adjacent channels overlap.
Kismet also supports logging of the geographical coordinates of the network if the input from a GPS receiver is additionally available.
Server / Drone / Client infrastructure[edit]
Kismet has three separate parts. A drone can be used to collect packets, and then pass them on to a server for interpretation. A server can either be used in conjunction with a drone, or on its own, interpreting packet data, and extrapolating wireless information, and organizing it. The client communicates with the server and displays the information the server collects.
Plugins[edit]
![Kismac for mac os x Kismac for mac os x](/uploads/1/1/8/1/118128372/882287090.jpg)
With the updating of Kismet to -ng, Kismet now supports a wide variety of scanning plugins including DECT, Bluetooth, and others.
Usage[edit]
Kismet is used in a number of commercial and open source projects. It is distributed with Kali Linux.[3] It is used for wireless reconnaissance,[4] and can be used with other packages for an inexpensive wireless intrusion detection system.[5] It has been used in a number of peer reviewed studies such as 'Detecting Rogue Access Points using Kismet'.[6]
Kismac Mac Os
See also[edit]
- KisMAC (for Mac OS X)
Kismac Para Macos High Sierra
References[edit]
- ^https://www.kismetwireless.net/ Kismet web site
- ^'Kismet Readme'. kismetwireless.net. Retrieved 2008-02-22.
- ^'Kismet'. Kali Tools. Kali Linux.
- ^Lynn, Michael; Biondi, Philippe; Beauchesne, Nicolas (August 2007). Security Power Tools. O'Reilly Media. Retrieved 9 March 2016.
- ^Murray, Jason. 'An Inexpensive Wireless IDS using Kismet and OpenWRT'. SANS Institute. Retrieved 9 March 2016.
- ^Thejdeep, G. (2015). 'Detecting Rogue Access Points using Kismet'. In Communications and Signal Processing: 0172–0175. doi:10.1109/ICCSP.2015.7322813. ISBN978-1-4799-8081-9.
Download Kismac For Mac Os X
External links[edit]
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Kismet_(software)&oldid=959845373'