wirelessdefence@gmail.com

A UK based Wireless Security Group

Kismet

Kismet Wireless Discovery Tool Overview

Kismet is an open source sniffer, WIDS, wardriver, and packet capture tool for Wi-Fi, Bluetooth, BTLE, wireless thermometers, airplanes, power meters, Zigbee, and more.

Kismet runs on Linux, macOS, and Windows via Windows Subsystem for Linux (WSL).

Kismet can operate both headless as a standalone capture and WIDS system, or with a full modern web-based UI.

Installation

There is a comprehensive installation guide on the project homepage:

If you’re utilising Kali’s packaged version you just need to install it:

sudo apt install kismet

Warning: We had issues attempting to install kismet from source on a Raspberry Pi 3 (1GB of RAM). The build fails at the make stage and it appears that either a lack of memory resources and/or memory access speed are the cause. Everything works fine on a Raspberry Pi 4 (4GB of RAM), albeit the build process does take a while!

Once installed (even on Kali) you’ll need to add your user to the kismet group as kismet typically runs suid-root i.e. kistmet runs as root. Configuring kismet suid-root negates the need to make use of sudo when kismet is called.

Add yourself to the kismet group (vi /etc/group) and add your user e.g.:

kismet:x:115:[your_username]

You’ll now need to log out and log back in again for this to take affect.

Once you’re rebooted confirm your user is now a member of the kismet group by running:

groups

Next add your capture interface to /etc/kismet/kismet.conf e.g.:

source=wlan0

Running Kismet

If all is well kismet can be started with:

kismet

You can now point a browser to the following URL to view kismet’s device discovery portal:

http://127.0.0.1:2501/

We’re actually running kismet on a Raspberry Pi, as this is headless we need to tunnel the HTTP / web connection over SSH using the following command:

Note: This ssh command isnt required if you’re running kismet locally e.g. on Kali Linux.

ssh -L 2501:localhost:2501 matt@192.168.1.12

On your initial connection to the webpage you’ll need to create a kismet portal username and password.

Once new credentials are created and we login, we are then presented with the main kismet display:

Further graphs and charts become available by drilling down into different devices / SSIDs:

Our Opinion: kismet seems to have been around forever, and it just gets better with age. Its great for short or long term 802.11 monitoring scenarios and is a tool you should always have available in your wireless toolset.