• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

KisMAC – Free WiFi Stumbler/Scanner for Mac OS X

December 12, 2007

Views: 84,002

KisMAC is an opensource and free stumbler/scanner application for Mac OS X. It has an advantage over MacStumbler/iStumbler/NetStumbler in that it uses monitor mode and passive scanning.

KisMAC supports several third party PCMCIA cards – Orinoco, PrismII, Cisco Aironet, Atheros and PrismGT. USB Prism2 is supported as well, and USB Ralink support is in development. All of the internal AirPort hardware is supported as well.

System Requirements

  • Mac OS 10.4
  • A Mac with a supported PCMCIA, USB or internal AirPort

Features

  • Reveals hidden/cloaked/closed SSIDs
  • Shows logged in Clients (with MAC Addresses, IP addresses and signal strengths)
  • Mapping and GPS support
  • Can draw area maps of network coverage
  • PCAP import and export
  • Support for 802.11b,g,n
  • Different attacks against encrypted networks
  • Deauthentication attacks
  • AppleScript-able
  • Kismet drone support (capture from a Kismet drone)

Active mode, also referred to as managed mode, sends probe requests and is pretty boring.
Passive mode is more commonly known as monitor mode, and passively monitors what’s already in the air without interfering in it.
Active attacks like deauth and reinjection (where supported) require your device to be in monitor or passive mode.

You can download KisMAC here:

KisMAC

Or read more here.

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Apple, Hacking Tools, Wireless Hacking Tagged With: kismet, netstumbler, wep-cracking, wifi-hacking, wifi-security, wifi-sniffing, Wireless Hacking



Reader Interactions

Comments

  1. net2004eng says

    December 12, 2007 at 10:41 pm

    KisMAC and Kismet (for Linux) are awesome free RF Monitoring tools. Anyone who has ever used Netstumbler (the Active Scanner many use if running Windows) will be delighted by the stealth that KisMAC and Kismet provide…plus, these tools are actively maintained, and have an active community which supports and develops the products…

  2. net2004eng says

    December 12, 2007 at 10:46 pm

    One other note….KisMAC is of course only for MAC’s, where Kismet is only for *nix…but KisWin also exists:

    http://www.renderlab.net/projects/wrt54g/kiswin.html

  3. mumble says

    December 12, 2007 at 11:16 pm

    The problem with KisWin is device support. Virtually no windows drivers support rfmon mode, making real scanners difficult to write for that platform. Kismet has had windows support for a long time, but hardware support has been its undoing. In fact, Kismet will actually run on windows hardware with rfmon enabled using the one card that has rfmod drivers for that platform. (I believe it’s a specialty card for security work…but don’t quote me.)

  4. Pantagruel says

    December 13, 2007 at 12:36 am

    Let’s see if I can persuade Santa to drop a MacBook Pro down the chimnee, all other OSses are covered ;)

    Indeed a very handy addition when concerning stealth and the naming convention is simply fun, Kismet, KisMac and KisWin. Not that stealth is really needed, the amount of open AP’s is big enough to hop about without too much of a risk of being caught (netstumbler gives me 7 with average and above signal strength), a reboot is usually enough to switch to another AP. Within the restricted environment of my job it’s a cool app and has helped (Kismet) to find ‘rogue’ AP’s without arousing suspision.

  5. goodpeople says

    December 13, 2007 at 9:45 am

    Good to know that there are also good sectools available for the mac. One of my students is using a Mac and I have been wondering about the software to use for my classes.

  6. Pantagruel says

    December 13, 2007 at 11:03 am

    @ goodpeople

    The underlying OS of OS X is bsd like, it will mean some code changes to get it running.
    According to Apple (http://www.apple.com/macosx/technology/unix.html) it’s fully unix compliant

  7. net2004eng says

    December 13, 2007 at 2:56 pm

    @mumble

    I was going to mention this actually after I made the post, about rfmon support for windows. You can purchase a product, like AirPcap: http://www.cacetech.com/products/airpcap.htm

    but the cost is prohibitive for most…None the less, another category where Windows is slacking…

  8. Sir Henry says

    December 14, 2007 at 3:49 am

    I will have to give KisMac another shot. I tried it out with 10.4 a few months back with a d-link usb wireless adapter, but for some reason, the drivers just did not work. Is this version a new release?

  9. Sir Henry says

    December 14, 2007 at 4:26 pm

    Ah, it is the same release as before, but it looks as though they are beginning to do more with it now that they have moved their servers to Switzerland. The one aspect about the Airport cards is that on the Intel Macbook/Pro models, they cannot be put into passive mode, thus requiring a usb nic that has supported drivers. I do have a supported D-Link nic, but the drivers are obsolete and appear to crash the card every time I try to put it into passive mode. Back the to the drawing board, I guess.

  10. goodpeople says

    December 17, 2007 at 11:39 am

    @Pantagruel,

    I don’t wory too much about availability of the right tools. Like you said, OSX’s bsd background sort of garuantees anything to be there.

  11. Pantagruel says

    December 17, 2007 at 3:38 pm

    @ goodpeople

    I will shortly find out (X-mas holidays will give me some time hopefully, after relatives/etc have gone). I got myself a Mac Mini (Santa sort of told me no PB this year :( ) and am now looking for a suitable wireless adapter (usb) since the onboard doesn’t appear to work with kisMac.
    Apart from that there will some digging into the OS X-es BSD background.

  12. Sir Henry says

    December 17, 2007 at 3:54 pm

    @Pantagruel

    I bought the D-Link DWL-122 for use with KisMac. It is probably the most sought after by Mac users for KisMac. The only problem is finding a firmware that works properly with it. I had some down time a few months back and was playing around with the latter, but have since been too busy to get back to it. If I have time over the holiday, I will let you know what I find.

  13. eM3rC says

    January 6, 2008 at 10:19 pm

    This with netstumbler is an amazing program. There was a section of 60 Minutes dedicated to the use of this program to pick up mall wi-fi networks so hackers could steal peoples credit card numbers while the information was being transfered between the atm card slider thing and the modem to process the credit card information.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 402

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 462

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 383

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 584

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 554

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 726

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,294,196)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,085)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,621)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,680)
  • Password List Download Best Word List – Most Common Passwords (933,484)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,146)
  • Hack Tools/Exploits (673,293)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,157)

Search

Recent Posts

  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy