Solved

source= setting in kismet.conf under ubuntu 11.10

Posted on 2012-03-18
2
854 Views
Last Modified: 2012-08-13
I installed kismet via apt-get.

I'm having a lot of trouble figuring out how to configure either of my wifi cards:

wlan0 rtl73usb
wlan1 rtl8187

Kismet documentation says
"All modern drivers on Linux use the mac80211 driver framework"

the output of "lsmod | grep -i rtl8187"  includes:
mac80211              272785  3 rtl8187,rt2x00usb,rt2x00lib

Is that saying that I'm using the rtl8187 via mac80211?

I tried this and it didn't work:
source=mac80211,wlan1, description

There's something I'm not understanding, can someone help me figure out what it is?
0
Comment
Question by:SonicVoom
2 Comments
 
LVL 11

Accepted Solution

by:
Khandakar Ashfaqur Rahman earned 500 total points
ID: 37740086
It means, mac80211 module loaded and  memory size using=272785 and 3 dependant modules (rtl8187,rt2x00usb,rt2x00lib) are using mac80211.

##### Source lines are defined with 'source=type,interface,name[,channel]'.#####

So you may try all of the followings (One of the following should work):
source=rt8187,wlan1,wlan1
or
source=rtl8187,wlan1,wlan1
or
source=r8187,wlan1,wlan1

The following links could help you too:
http://www.wirelessdefence.org/Contents/Installingkismet.htm
http://kb.wheretolookfor.me/content/configure-kismet-realtek-8176-card
0
 
LVL 2

Author Closing Comment

by:SonicVoom
ID: 37740873
thanks, it was rt8187.
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Join & Write a Comment

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now