![]() This means that it constantly changes from channel to channel non-sequentially, in a user-defined sequence with a default value that leaves big holes between channels (for example, 1-6-11-2-7-12-3-8-13-4-9-14-5-10). In order to find as many networks as possible, it supports channel hopping. XML output for integration with other tools.Distributed remote sniffing via light-weight remote capture.Live export of packets to other tools via tun/tap virtual interfaces.Plug-in architecture to expand core features.Standard PCAP logging (compatible with Wireshark, TCPDump, etc).It also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks and sports a plugin architecture allowing for additional non-802.11 protocols to be decoded. ![]() It is also the most widely used and up to date open source wireless monitoring tool. Namely, without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients and to associate them with each other. Kismet differs from other wireless network detectors in working passively.
0 Comments
Leave a Reply. |