An introduction to the Kismet packet sniffer


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News An introduction to the Kismet packet sniffer
# 1  
Old 07-03-2008
An introduction to the Kismet packet sniffer

Thu, 03 Jul 2008 15:00:00 GMT
Kismet is a wireless "detector, sniffer, and intrusion detection system," and one of the growing list of essential open source tools for computer network security professionals. Kismet runs on any POSIX-compliant platform, including Windows, Mac OS X, and BSD, but Linux is the preferred platform because it has more unencumbered RFMON-capable drivers than any of the others.


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. What is on Your Mind?

Introduction

Hi everyone. I am not really a new member i was once a member using the handle despiragado. I now wish to be identified with my new handle. It's been a while i have last visited the forum to see whats happening. I guess a lot has happened. I will try to read up and keep up to date. I am a... (3 Replies)
Discussion started by: split_func0
3 Replies

2. AIX

Packet loss coming with big packet size ping

(5 Replies)
Discussion started by: Vishal_dba
5 Replies

3. Programming

Raw Socket Programming - Efficient Packet Sniffer

Hi, I have the requirement to sniff packets from the Ethernet card on my Linux machine and process it and feed it to a RANAP protocol stack. So far I have written the raw packet sniffer and successfully sniffing packets and do little processing. However, for huge number of packets ... (9 Replies)
Discussion started by: rstnsrr
9 Replies

4. Programming

Writing a Packet sniffer

Hi, I want to write a packet sniffer in C without using libpcap. Can anyone suggest me how to begin writing it? Any tutorials or books? Thanks in advance! (2 Replies)
Discussion started by: nefarious_genus
2 Replies

5. Shell Programming and Scripting

Introduction

Hi, I am new here. Recently I have started working on Unix Shell Scripting. So may I know from where to start... Regards, Darshak Raut (3 Replies)
Discussion started by: darshakraut
3 Replies

6. IP Networking

regarding sniffer

hi this is munna. am doing a program about sniffer. if the user can delete the file from /root/.mozilla/firefox/27a5g6oo.default history.dat or he/she can do in browser window edit->preferences->privacy->history as "0"(zero). (remember visted pages for the last 0 days). ... (3 Replies)
Discussion started by: munna_dude
3 Replies

7. Shell Programming and Scripting

key sniffer

Hi everybody, I'll like to know how I can add in my script a key sniffer. In fact, I'll like to detect a "Ctrl + C" command... How can do that and is it possible in shell script under AIX ? Thanks !!! Dimitri (1 Reply)
Discussion started by: dfrangidis
1 Replies
Login or Register to Ask a Question
RANDPKT(1)						  The Wireshark Network Analyzer						RANDPKT(1)

NAME
randpkt - Random Packet Generator SYNOPSIS
randpkt [ -b <maxbytes> ] [ -c <count> ] [ -t <type> ] <filename> DESCRIPTION
randpkt is a small utility that creates a pcap trace file full of random packets. By creating many randomized packets of a certain type, you can test packet sniffers to see how well they handle malformed packets. The sniffer can never trust the data that it sees in the packet because you can always sniff a very bad packet that conforms to no standard. randpkt produces very bad packets. When creating packets of a certain type, randpkt uses a sample packet that is stored internally to randpkt. It uses this as the starting point for your random packets, and then adds extra random bytes to the end of this sample packet. For example, if you choose to create random ARP packets, randpkt will create a packet which contains a predetermined Ethernet II header, with the Type field set to ARP. After the Ethernet II header, it will put a random number of bytes with random values. OPTIONS
-b <maxbytes> Default 5000. Defines the maximum number of bytes added to the sample packet. If you choose a maxbytes value that is less than the size of the sample packet, then your packets would contain only the sample packet... not much variance there! randpkt exits on that condition. -c <count> Default 1000. Defines the number of packets to generate. -t <type> Default Ethernet II frame. Defines the type of packet to generate: arp Address Resolution Protocol bgp Border Gateway Protocol bvlc BACnet Virtual Link Control dns Domain Name Service eth Ethernet fddi Fiber Distributed Data Interface giop General Inter-ORB Protocol icmp Internet Control Message Protocol ip Internet Protocol llc Logical Link Control m2m WiMAX M2M Encapsulation Protocol megaco MEGACO nbns NetBIOS-over-TCP Name Service ncp2222 NetWare Core Protocol sctp Stream Control Transmission Protocol syslog Syslog message tds TDS NetLib tcp Transmission Control Protocol tr Token-Ring udp User Datagram Protocol usb Universal Serial Bus usb-linux Universal Serial Bus with Linux specific header EXAMPLES
To see a description of the randpkt options use: randpkt To generate a capture file with 1000 DNS packets use: randpkt -b 500 -t dns rand_dns.pcap To generate a small capture file with just a single LLC frame use: randpkt -b 100 -c 1 -t llc single_llc.pcap SEE ALSO
pcap(3), editcap(1) 1.10.3 2013-07-28 RANDPKT(1)