Solved

source= setting in kismet.conf under ubuntu 11.10

Posted on 2012-03-18
2
855 Views
Last Modified: 2012-08-13
I installed kismet via apt-get.

I'm having a lot of trouble figuring out how to configure either of my wifi cards:

wlan0 rtl73usb
wlan1 rtl8187

Kismet documentation says
"All modern drivers on Linux use the mac80211 driver framework"

the output of "lsmod | grep -i rtl8187"  includes:
mac80211              272785  3 rtl8187,rt2x00usb,rt2x00lib

Is that saying that I'm using the rtl8187 via mac80211?

I tried this and it didn't work:
source=mac80211,wlan1, description

There's something I'm not understanding, can someone help me figure out what it is?
0
Comment
Question by:SonicVoom
2 Comments
 
LVL 11

Accepted Solution

by:
Khandakar Ashfaqur Rahman earned 500 total points
ID: 37740086
It means, mac80211 module loaded and  memory size using=272785 and 3 dependant modules (rtl8187,rt2x00usb,rt2x00lib) are using mac80211.

##### Source lines are defined with 'source=type,interface,name[,channel]'.#####

So you may try all of the followings (One of the following should work):
source=rt8187,wlan1,wlan1
or
source=rtl8187,wlan1,wlan1
or
source=r8187,wlan1,wlan1

The following links could help you too:
http://www.wirelessdefence.org/Contents/Installingkismet.htm
http://kb.wheretolookfor.me/content/configure-kismet-realtek-8176-card
0
 
LVL 2

Author Closing Comment

by:SonicVoom
ID: 37740873
thanks, it was rt8187.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now