Kismet Hacking


  • Frank Thornton, Owner, Blackthorn Systems, New Hampshire, USA
  • Michael Schearer
  • Brad Haines, Chief researcher of

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
View full description


New and experienced information security professionals; advanced computer users who are interesting in using Kismet


Book information

  • Published: June 2008
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-117-4

Table of Contents

Introduction / Design Structure - This chapter tells how Kismet functions as well as background information on the design of the different models 2. Basic Install - Covers the installation process, and selection of various wireless cards and other equipment such as GPS receivers and antennas 3. Basic Menus - Details on the main menus for operating Kismet 4. Server .conf File Configuration - Configuration of the Server portion of the program. 5. Client .conf File Configuration - Configuration of the Client and User Interface section of the application. 6. Advanced Configuration - Tweaking and complex uses for cutting edge users 7. Drones - Setting up Drone Kismet servers as for remote operations 8. IDS Setup - How to combine Drones into an advanced Wireless Intrusion Detection System 9. GPSmap - Making Kismet plot where it’s been, and provideing advanced maps and diagrams