diff options
author | Audrius Kažukauskas <audrius@neutrino.lt> | 2010-06-29 20:35:12 -0500 |
---|---|---|
committer | Robby Workman <rworkman@slackbuilds.org> | 2010-06-29 20:35:12 -0500 |
commit | 66ad06bd2f6fb9d1386367f41e408fbb65102d1d (patch) | |
tree | 8c722d7bed30c18658ead5d4013eb520bbe7a8a7 /network/kismet/README | |
parent | b8b1b9cccdedbcfbb792c8e80eae5720bcd924e3 (diff) | |
download | slackbuilds-66ad06bd2f6fb9d1386367f41e408fbb65102d1d.tar.gz |
network/kismet: Added (NIDS tool)
Signed-off-by: Robby Workman <rworkman@slackbuilds.org>
Diffstat (limited to 'network/kismet/README')
-rw-r--r-- | network/kismet/README | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/network/kismet/README b/network/kismet/README new file mode 100644 index 0000000000..14785e1853 --- /dev/null +++ b/network/kismet/README @@ -0,0 +1,14 @@ +Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion +detection system. Kismet will work with any wireless card which supports raw +monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, +802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which +allow sniffing other media such as DECT. + +Kismet identifies networks by passively collecting packets and detecting +standard named networks, detecting (and given time, decloaking) hidden +networks, and inferring the presence of nonbeaconing networks via data traffic. + +This script requires a 'kismet' group to exist before running. The recommended +GID is 234. You can create it like this: groupadd -g 234 kismet + +After installation, add user to kismet group and re-login. |