Difference between revisions of "Category:Network Forensics"

From Forensics Wiki
Jump to: navigation, search
(kisMAC wireless sniffer/scanner)
(Features)
Line 9: Line 9:
  
 
""KisMAC"" is a free and open-source sniffer/scanner for MAC OS X that uses third party usb devices including, Intersil Prism2, Ralink rt2570, rt73, and Realtek rtl8187 chipsets. All of the internal AirPort hardware is supported for scanning.
 
""KisMAC"" is a free and open-source sniffer/scanner for MAC OS X that uses third party usb devices including, Intersil Prism2, Ralink rt2570, rt73, and Realtek rtl8187 chipsets. All of the internal AirPort hardware is supported for scanning.
 
== Features ==
 
 
* Reveals hidden / cloaked / closed SSIDs
 
* Shows logged in clients (with MAC Addresses, IP addresses and signal strengths)
 
* Mapping and GPS support
 
* Can draw area maps of network coverage
 
* PCAP import and export
 
* Support for 802.11b/g
 
* Different attacks against encrypted networks
 
* Deauthentication attacks
 
* AppleScript-able
 
* Kismet drone support (capture from a Kismet drone)
 
 
  
 
== Supported Hardware Chipsets ==
 
== Supported Hardware Chipsets ==

Revision as of 17:47, 10 March 2013

KisMAC
Maintainer: KisMAC Team
OS: Template:MAC OS X
Genre: Wireless forensics
License: Template:Unknown
Website: [1]

""KisMAC"" is a free and open-source sniffer/scanner for MAC OS X that uses third party usb devices including, Intersil Prism2, Ralink rt2570, rt73, and Realtek rtl8187 chipsets. All of the internal AirPort hardware is supported for scanning.

Supported Hardware Chipsets

Apple AirPort and AirPort Extreme (dependent upon Apple's drivers) Intersil Prism 2, 2.5, 3 USB devices Ralink rt2570 and rt73 USB devices Realtek RTL8187L USB (such as the Alfa AWUS036H, which does not work on Mac OS 10.6.7 or later)

Crypto Support

Bruteforce attacks against LEAP, WPA and WEP Weak scheduling attack against WEP Newsham 21-bit attack against WEP


More information about KisMAC can be found at link kismac-ng.org