?
Solved

source= setting in kismet.conf under ubuntu 11.10

Posted on 2012-03-18
2
Medium Priority
?
873 Views
Last Modified: 2012-08-13
I installed kismet via apt-get.

I'm having a lot of trouble figuring out how to configure either of my wifi cards:

wlan0 rtl73usb
wlan1 rtl8187

Kismet documentation says
"All modern drivers on Linux use the mac80211 driver framework"

the output of "lsmod | grep -i rtl8187"  includes:
mac80211              272785  3 rtl8187,rt2x00usb,rt2x00lib

Is that saying that I'm using the rtl8187 via mac80211?

I tried this and it didn't work:
source=mac80211,wlan1, description

There's something I'm not understanding, can someone help me figure out what it is?
0
Comment
Question by:SonicVoom
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Accepted Solution

by:
Khandakar Ashfaqur Rahman earned 2000 total points
ID: 37740086
It means, mac80211 module loaded and  memory size using=272785 and 3 dependant modules (rtl8187,rt2x00usb,rt2x00lib) are using mac80211.

##### Source lines are defined with 'source=type,interface,name[,channel]'.#####

So you may try all of the followings (One of the following should work):
source=rt8187,wlan1,wlan1
or
source=rtl8187,wlan1,wlan1
or
source=r8187,wlan1,wlan1

The following links could help you too:
http://www.wirelessdefence.org/Contents/Installingkismet.htm
http://kb.wheretolookfor.me/content/configure-kismet-realtek-8176-card
0
 
LVL 2

Author Closing Comment

by:SonicVoom
ID: 37740873
thanks, it was rt8187.
0

Featured Post

Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
The Summer 2017 Scholarship Winners have been announced!
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses
Course of the Month12 days, 4 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question