• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Kismet Download – Wireless Network Hacking, Sniffing & Monitoring

February 6, 2008

Views: 135,664

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It will work with any wireless card which supports raw monitoring (rfmon) mode and can sniff 802.11b, 802.11a, and 802.11g traffic.

Kismet Download - Wireless Network Hacking, Sniffing & Monitoring

What is Kismet?

Kismet differs from other wireless network detectors in working passively. Namely, without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients and to associate them with each other. It is also the most widely used and up to date open source wireless monitoring tool.

It also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks and sports a plugin architecture allowing for additional non-802.11 protocols to be decoded.

Kismet Features

  • 802.11 sniffing
  • Standard PCAP logging (compatible with Wireshark, TCPDump, etc)
  • Client/Server modular architecture
  • Plug-in architecture to expand core features
  • Multiple capture source support
  • Live export of packets to other tools via tun/tap virtual interfaces
  • Distributed remote sniffing via light-weight remote capture
  • XML output for integration with other tools

In order to find as many networks as possible, it supports channel hopping. This means that it constantly changes from channel to channel non-sequentially, in a user-defined sequence with a default value that leaves big holes between channels (for example, 1-6-11-2-7-12-3-8-13-4-9-14-5-10). The advantage of this method is that it will capture more packets because adjacent channels overlap.

There are more Wireless Hacking tools here.

You can download Kismet latest version here:

kismet.tar.gz

Or read more here.

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Hacking Tools, Wireless Hacking Tagged With: kismet, network sniffer, sniffing, wifi-hacking, wifi-jacking



Reader Interactions

Comments

  1. Goodpeople says

    February 6, 2008 at 12:09 pm

    Personally I am an aircrack-ng kinda guy. But that is only if I want to break the encryption. Kismet is a very valueable tool for all other wireless related fun things you can think of.

  2. Benjamin Juang says

    February 6, 2008 at 12:33 pm

    And for those of us who are running MacOS X, there’s Kismac, the mac equivalent – I think we have almost everything Kismet has? (Was initially a port of Kismet to MacOS X, I think..? I may be wrong, don’t quote me on that.)

    Am wondering though – has anyone tried it on windows? Or have a similar tool for windows?

  3. Pantagruel says

    February 6, 2008 at 3:03 pm

    As with most *nix apps you can use Cygwin to run then under Windows

    (see http://www.kismetwireless.net/documentation.shtml)

    You could give NetStumbler a try when tied to the Windows platform

  4. DaCapn says

    February 6, 2008 at 5:33 pm

    To the best of my knowledge there is only one card that works with kismet under windows. The windows drivers from the manufacturers do not support rfmon. Similarly, this means you can’t use the windows drivers with ndiswrapper on a unix-based system.

  5. mumble says

    February 6, 2008 at 8:18 pm

    @pantagruel – the problem is RFMON support. There is only one card with decent RFMON support for Win32, and that one is a specialty device for the wireless security market, and is expen$ive.

    Right now, RFMON/packet injection tools are somewhat mature and capable for the free *nix operating systems, not bad for OSX, and pretty much worthless elsewhere. In fact, at this point – unless you like getting very intimate with the details of setting up kernel mode drivers, you’ll probably end up running something like Backtrack-3.

  6. Arkwin says

    February 6, 2008 at 10:04 pm

    http://www.oxid.it/
    Cain & Able

    http://www.netstumbler.com/
    Net Stumbler

  7. Emkayu says

    February 7, 2008 at 1:56 am

    If you’ve tried the OS X version of this, KisMac you will know how powerful and easy to use this is. Suppors reinjecting of packets, authentication floods, deauthenticating, and various cracking attacks (weak schedules, bruteforce and even wordlist attacks)

  8. Yoshi says

    February 7, 2008 at 2:19 am

    First time reader! Don’t get me me wrong I think Kismet is a great tool, however i think a lot of the times you actually need to have some pretty pictures when presenting a wireless assessment / investigation / etc to mangement IMHO – more so with wireless than any other area for some reason (I guess it’s because you can’t see it so it makes it harder to grasp the concepts). Some times you got to pay the bucks to get the professional / graphical reporting

    Nice blog! I’ll be back tomorrow to see the next post :)

  9. eM3rC says

    February 7, 2008 at 9:12 am

    Commenting on Emkayu’s comment, 60 Minutes (CBS I think?) did a story about Kismet. More specifically, how it could be used to tap into stores wireless routes and steal credit card information. According to the story those little credit card scanners are wireless (the cords are power I guess) and when you swipe the card it gets sent to a modem which in turn is sent to the bank for conformation. Hackers were taping into these WEP protected modems (2-3 minutes to break if your really good, 10 for a normal user) and took the info passing through it.

    I would say this is OSX’s aircrack-ng.

  10. Pantagruel says

    February 7, 2008 at 6:41 pm

    @Emkayu

    True, I recently bought me a Mac Mini and it was quite a pain to find a supported wireless network dongle (got one through Ebay). Haven’t spend too much time playing with it.

  11. Pantagruel says

    February 7, 2008 at 7:04 pm

    Just for fun, go to kismac.de , it nicely sums up some of the postings here on DarkNet

  12. Yoshi says

    February 7, 2008 at 10:36 pm

    Oddly enough i’m actually in Germany this week. I may be way out of line here, but I think Germany has lost a lot of the organisation ‘lets do it the right way’ , hard work ethic it was once famous for – but then they have the workers council which is just a world of pain to deal with. (I don’t actually know the reason, but i would guess that the german work law is soo difficult that’s why Walmart never made a profit till the day they pulled out of Germany)

    Obvisouly this is an outsiders view – German readers will have a far more informed opinion that little old me who visits on business every couple of months.

  13. eM3rC says

    February 8, 2008 at 3:32 am

    Good point pantagruel. Thanks for the link!

  14. DaCapn says

    February 9, 2008 at 8:53 pm

    Was my previous post deleted for some reason? I don’t see it here now…

    Netstumbler is a passive sniffer. Active sniffers like kismet are able to do things like discover APs that don’t broadcast their SSID.

  15. eM3rC says

    February 9, 2008 at 9:04 pm

    @DaCapn

    Good point. Although to get into a modem that doesn’t broadcast its SSID seems like more questionable cracking ;)

  16. eM3rC says

    February 9, 2008 at 10:13 pm

    Got a kind of random post here.

    For one of my classes I want to write a report on what exactly computer hacking is, what is happening with it today (groups, what they are doing, general modern hacker profile), and the history of it. As for material I have begun reading some books from the library (including Mitnick’s books).

    If anyone could recommend any more material it would be much appreciated.

  17. Pantagruel says

    February 10, 2008 at 3:10 pm

    For some real old skool stuff try:

    The cuckoo’s egg by Clifford Stoll

    An Evening with Berferd by Bill Cheswick

    More of this time:

    Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security Series) by Greg Hoglund and Jamie Butler

    Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson

  18. eM3rC says

    February 10, 2008 at 8:26 pm

    Thanks a million Pantagruel!

    The world needs to know hackers aren’t always bad ;)

    If anyone else can recommend any material feel free to do so.

  19. Emkayu says

    May 15, 2008 at 9:19 pm

    theres a list of compatible dongles about, i personally use the Dlink DWL g122 on the RA-link build of kismac :D, can crack wep keys in local area under 10 minutes, link it with a GPS device and it’s great for wardriving with a macbook

  20. Lee says

    February 3, 2009 at 10:55 pm

    does anyone know if dell wireless 1390 wlan mini-card support the raw monitoring (rfmon) mode?? thanks.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 120

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 321

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 516

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 506

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 698

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Views: 8,719

Introduction: How Much of the Internet Can You See? You're only scratching the surface when you … ...More about Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (227)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,291,997)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,071)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,614)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,675)
  • Password List Download Best Word List – Most Common Passwords (933,464)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,130)
  • Hack Tools/Exploits (673,287)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,144)

Search

Recent Posts

  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025
  • Understanding the Deep Web, Dark Web, and Darknet (2025 Guide) April 30, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy