Solved

source= setting in kismet.conf under ubuntu 11.10

Posted on 2012-03-18
2
860 Views
Last Modified: 2012-08-13
I installed kismet via apt-get.

I'm having a lot of trouble figuring out how to configure either of my wifi cards:

wlan0 rtl73usb
wlan1 rtl8187

Kismet documentation says
"All modern drivers on Linux use the mac80211 driver framework"

the output of "lsmod | grep -i rtl8187"  includes:
mac80211              272785  3 rtl8187,rt2x00usb,rt2x00lib

Is that saying that I'm using the rtl8187 via mac80211?

I tried this and it didn't work:
source=mac80211,wlan1, description

There's something I'm not understanding, can someone help me figure out what it is?
0
Comment
Question by:SonicVoom
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Accepted Solution

by:
Khandakar Ashfaqur Rahman earned 500 total points
ID: 37740086
It means, mac80211 module loaded and  memory size using=272785 and 3 dependant modules (rtl8187,rt2x00usb,rt2x00lib) are using mac80211.

##### Source lines are defined with 'source=type,interface,name[,channel]'.#####

So you may try all of the followings (One of the following should work):
source=rt8187,wlan1,wlan1
or
source=rtl8187,wlan1,wlan1
or
source=r8187,wlan1,wlan1

The following links could help you too:
http://www.wirelessdefence.org/Contents/Installingkismet.htm
http://kb.wheretolookfor.me/content/configure-kismet-realtek-8176-card
0
 
LVL 2

Author Closing Comment

by:SonicVoom
ID: 37740873
thanks, it was rt8187.
0

Featured Post

Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question