Visit Our UNIX and Linux User Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #848
Difficulty: Medium
The IEEE standardized Bluetooth as IEEE 802.15.1, but IEEE no longer maintains the Bluetooth standard.
True or False?
Linux & Unix Commands - Search Man Pages

kismet(1) [centos man page]

KISMET(1)						    BSD General Commands Manual 						 KISMET(1)

kismet -- Wireless sniffing and monitoring SYNOPSIS
kismet [server-options] [--] [client-options] kismet_server [-nqs] [-t title] [-f config-file] [-c capture-source] [-C enable-capture-sources] [-l log-types] [-d dump-type] [-m max-packets-per-file] [-g gpshost:port] [-p listen-port] [-a allowed-hosts] [-N server-name] kismet_client [-qr] [-f config-file] [-s serverhost:port] [-g gui-type] [-c display-columns] DESCRIPTION
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hid- den networks, and inferring the presence of nonbeaconing networks via data traffic. kismet supports logging to the wtapfile packet format (readable by tcpdump and ethereal) and saves detected network informat as plaintext, CSV, and XML. kismet is capable of using any GPS supported by gpsd and logs and plots network data. kismet is divided into three basic programs, kismet_server kismet_client and gpsmap USAGE
kismet handles automatically starting kismet_server and kismet_client. kismet is installed as suid-root by default. It will drop privs to the user specified in kismet.conf immediately after binding and configur- ing the capture source. KISMET_SERVER kismet_server captures, dissects, and logs packets and GPS data. It is capable of running in `headless' mode with no display. Multiple clients (on multiple computers) can be connected to a single server. -I Set the initial channel for a channel source (source:channel) -x Forcibly enable the channel hopper -X Forcibly disable the channel hopper -t Set the title used for the %t field of the logfile template (Default: Kismet) -n Disable all logging -f Use an alternate config file -c Override capture source lines (type,interface,name). Refer to kismet.conf(5) for more information. Multiple capture source options can be specified for multiple sources. All sources provided here are automatically enabled unless an enable list is also supplied. -C Comma-separated list to override what capture sources are enabled. -l Override logging types, comma separated (dump, cisco, weak, csv, xml, gps) -m Override maximum packets logged per file -q Override sound option and run in quiet mode -g Override GPS host:port -p Override port to listen on for clients -a Override list of client IPs or network/mask blocks (comma separated) allowed to connect -s Run in silent mode (no console status information) -N Override server name for this instance of Kismet -v Print version -h Help KISMET_CLIENT kismet_client is a ncurses and panels interface which connects to the server and displays detected networks, statistics, network details, etc. -f Use an alternate config file -u Use an alternate UI config file -q Override sound option and run in quiet mode -s Override server host:port -r Attempt to automatically restablish the connection if the server terminates -g Override UI type (curses, panel) -c Override list of columns to display (comma seperated) -v Print version -h Help GPSMAP
gpsmap reads GPS and Network XML datafiles and plots networks on downloaded maps or user-supplied images (such as satellite photos). SEE ALSO
kismet_drone(1), gpsmap(1), kismet.conf(5), kismet_ui.conf(5), kismet_drone.conf(5) Kismet August 27, 2019 Kismet

Check Out this Related Man Page

WPI(4)							   BSD Kernel Interfaces Manual 						    WPI(4)

wpi -- Intel PRO/Wireless 3945ABG IEEE 802.11a/b/g wireless network driver SYNOPSIS
wpi* at pci? dev ? function ? DESCRIPTION
The wpi driver provides support for Intel PRO/Wireless 3945ABG Mini PCI Express network adapters. These are the modes the wpi driver can operate in: BSS mode Also known as infrastructure mode, this is used when associating with an access point, through which all traffic passes. This mode is the default. monitor mode In this mode the driver is able to receive packets without associating with an access point. This disables the internal receive fil- ter and enables the card to capture packets from networks to which it wouldn't normally have access, or to scan for access points. wpi supports software WEP. Wired Equivalent Privacy (WEP) is the de facto encryption standard for wireless networks. It can be typically configured in one of three modes: no encryption; 40-bit encryption; or 104-bit encryption. Unfortunately, due to serious weaknesses in the WEP protocol it is strongly recommended that it not be used as the sole mechanism to secure wireless communication. WEP is not enabled by default. CONFIGURATION
The wpi driver can be configured at runtime with ifconfig(8) using the following parameters: bssid bssid Set the desired BSSID. -bssid Unset the desired BSSID. The interface will automatically select a BSSID in this mode, which is the default. chan n Set the channel (radio frequency) to be used by the driver based on the given channel ID n. -chan Unset the desired channel to be used by the driver. The driver will automatically select a channel in this mode, which is the default. media media The wpi driver supports the following media types: autoselect Enable autoselection of the media type and options. mediaopt opts The wpi driver supports the following media options: monitor Select monitor mode. -mediaopt opts Disable the specified media options on the driver and return it to the default mode of operation (BSS). mode mode The wpi driver supports the following modes: 11a Force 802.11a operation. 11b Force 802.11b operation. 11g Force 802.11g operation. nwid id Set the network ID. The id can either be any text string up to 32 characters in length, or a series of hexadecimal digits up to 64 digits. An empty id string allows the interface to connect to any available access points. By default the wpi driver uses an empty string. Note that network ID is synonymous with Extended Service Set ID (ESSID). nwkey key Enable WEP encryption using the specified key. The key can either be a string, a series of hexadecimal digits (preceded by '0x'), or a set of keys of the form ``n:k1,k2,k3,k4'', where 'n' specifies which of the keys will be used for transmitted packets, and the four keys, ``k1'' through ``k4'', are configured as WEP keys. If a set of keys is specified, a comma (',') within the key must be escaped with a backslash. Note that if multiple keys are used, their order must be the same within the network. wpi is capable of using both 40-bit (5 characters or 10 hexadecimal digits) or 104-bit (13 characters or 26 hexadecimal digits) keys. -nwkey Disable WEP encryption. This is the default mode of operation. FILES
The driver needs at least version 2.14.4 of the following firmware file, which is loaded when an interface is brought up: /libdata/if_wpi/iwlwifi-3945.ucode EXAMPLES
# ifconfig wpi0 nwkey 0x1deadbeef1 Return wpi0 to its default settings: # ifconfig wpi0 -bssid -chan media autoselect nwid "" -nwkey Join an existing BSS network, ``my_net'': # ifconfig wpi0 netmask 0xffffff00 nwid my_net DIAGNOSTICS
wpi%d: device timeout A frame dispatched to the hardware for transmission did not complete in time. The driver will reset the hardware. This should not happen. wpi%d: fatal firmware error For some reason, the firmware crashed. The driver will reset the hardware. This should not happen. wpi%d: Radio transmitter is off The radio transmitter is off and thus no packet can go out. The driver will reset the hardware. Make sure the laptop radio switch is on. wpi%d: could not read firmware file For some reason, the driver was unable to read the firmware image from the filesystem. The file might be missing or corrupted. wpi%d: firmware file too short: %d bytes The firmware image is corrupted and can't be loaded into the adapter. wpi%d: could not load firmware An attempt to load the firmware into the adapter failed. The driver will reset the hardware. NOTES
On some laptops the radio transmitter button must be pushed twice to get the driver working, or you will get a wpi%d: fatal firmware error when the interface will be set to up SEE ALSO
arp(4), ifmedia(4), intro(4), netintro(4), pci(4), ifconfig(8), firmload(9) The IPW Web Page, AUTHORS
The wpi driver was originally written by Damien Bergamini <>. NetBSD porting was done by Jean-Baptiste Campesato <>. BSD
February 4, 2009 BSD

Featured Tech Videos