Kismet Wireless

Kismet Forums


Posted by:dragorn
Subject:Help with capture WEP decrypted data from single AP
Date:01:16:04 22/12/2005

Quick answer, because I'm going to dinner... Look at:

1. Filters. (you want BSSID or ANY)
2. Channel hop off
3. Set the initial channel (fourth optional field in source. type,device,name,channel)
4. Set the wepkey for your bssid
5. Set beacon log to false
6. Set mangle data logging to try (logs decoded fields)

All of that is in the config file and readme. Good luck, if you're still stuck I'll post something more later.


> Hi,
> I am in the process of teaching myself how to crack WEP keys and monitor 802.11 data. So far using Aircrack I have been able to crack my AP, now I want to be able to see if I can monitor the traffic between my AP and its clients. I was hoping that someone could help me with this task, perhaps by writing a short guide or outlning some steps.
> What I have is
> 1. SSID and Mac address of AP
> 2. WEP key used.
> I would like to configure kismet so that it monitors
> a. Only my AP
> b. Uses the WEP key to decode all trafffic
> c. Stores the sniffed data to a pcap compatible file for parsing thru dsniff later.
> d. ignores Beacon and other junk traffic from the AP so as to keep the filesize small.
> I am currently using the Auditor linux system. Any help would be greatly appreciated and passed on to other newbies.
> Thanks
> -ymee

Reply to this message