Difference between revisions of "Category:Network Forensics"

From ForensicsWiki
Jump to: navigation, search
(kisMAC wireless sniffer/scanner)
(Blanked the page)
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Infobox_Software |
  name = KisMAC |
  maintainer = KisMAC Team |
  os = {{MAC OS X}} |
  genre = Wireless forensics |
  license = {{Unknown}} |
  website = [http://www.http://kismac-ng.org] |
""KisMAC"" is a free and open-source sniffer/scanner for MAC OS X that uses third party usb devices including, Intersil Prism2, Ralink rt2570, rt73, and Realtek rtl8187 chipsets. All of the internal AirPort hardware is supported for scanning.
== Features ==
* Reveals hidden / cloaked / closed SSIDs
* Shows logged in clients (with MAC Addresses, IP addresses and signal strengths)
* Mapping and GPS support
* Can draw area maps of network coverage
* PCAP import and export
* Support for 802.11b/g
* Different attacks against encrypted networks
* Deauthentication attacks
* AppleScript-able
* Kismet drone support (capture from a Kismet drone)
== Supported Hardware Chipsets ==
Apple AirPort and AirPort Extreme (dependent upon Apple's drivers)
Intersil Prism 2, 2.5, 3 USB devices
Ralink rt2570 and rt73 USB devices
Realtek RTL8187L USB (such as the Alfa AWUS036H, which does not work on Mac OS 10.6.7 or later)
== Crypto Support ==
Bruteforce attacks against LEAP, WPA and WEP
Weak scheduling attack against WEP
Newsham 21-bit attack against WEP
More information about KisMAC can be found at [http://www.http://trac.kismac-ng.org/wiki link kismac-ng.org]

Latest revision as of 22:48, 10 March 2013