Part of Slepp's ProjectsPastebinTURLImagebinFilebin
Feedback -- English French German Japanese
Create Upload Newest Tools Donate

Advertising

Paste Description for Sartho

kismet not starting

Sartho
Sunday, June 3rd, 2007 at 1:32:16pm UTC 

  1. by Runing kismet...
  2.  
  3. Server options:  none
  4. Client options:  none
  5. Starting server...
  6. Suid priv-dropping disabled.  This may not be secure.
  7. No specific sources given to be enabled, all will be enabled.
  8. Enabling channel hopping.
  9. Enabling channel splitting.
  10. Source 0 (madwifi): Enabling monitor mode for madwifi_b source interface wifi0 channel 6...
  11. WARNING: wifi0 appears to not accept the Madwifi-NG controls. Will attempt to configure it as a standard Madwifi-old interface. If you are using madwifi-ng, be sure to set the source interface to the wifiX control interface, NOT athX
  12. FATAL: GetIFFlags: interface wifi0: No such device
  13. [1] + Done(1)                    ${BIN}/kismet_server --silent ${server}
  14. Waiting for server to start before starting UI...
  15.  
  16.  
  17. My kismet.conf
  18.  
  19.  
  20. # Kismet config file
  21. # Most of the "static" configs have been moved to here -- the command line
  22. # config was getting way too crowded and cryptic.  We want functionality,
  23. # not continually reading --help!
  24.  
  25. # Version of Kismet config
  26. version=2005.06.R1
  27.  
  28. # Name of server (Purely for organizational purposes)
  29. servername=Kismet
  30.  
  31. # User to setid to (should be your normal user)
  32. #suiduser=your_user_here
  33.  
  34. # Sources are defined as:
  35. # source=sourcetype,interface,name[,initialchannel]
  36. # Source types and required drivers are listed in the README under the
  37. # CAPTURE SOURCES section.
  38. # The initial channel is optional, if hopping is not enabled it can be used
  39. # to set the channel the interface listens on.
  40. # YOU MUST CHANGE THIS TO BE THE SOURCE YOU WANT TO USE
  41.  
  42.  
  43. #source=hostap,wlan0,hostap
  44. #source=madwifi_a,ath0,madwifi
  45. #source=madwifi_b,ath0,madwifi
  46. #source=madwifi_ag,ath0,madwifi
  47. source=madwifi_b,wifi0,madwifi
  48.  
  49.  
  50. #source=madwifi,eth1,atheros,6
  51. #source=madwifi_g,eth1,addme
  52. #source=madwifi_g,ath0,atheros,8
  53. #source=madwifi_g,wifi0,AtherosG
  54.  
  55. # Comma-separated list of sources to enable.  This is only needed if you defined
  56. # multiple sources and only want to enable some of them.  By default, all defined
  57. # sources are enabled.
  58. # For example:
  59. # enablesources=prismsource,ciscosource
  60.  
  61. # Do we channelhop?
  62. channelhop=true
  63.  
  64. # How many channels per second do we hop?  (1-10)
  65. channelvelocity=5
  66.  
  67. # By setting the dwell time for channel hopping we override the channelvelocity
  68. # setting above and dwell on each channel for the given number of seconds.
  69. #channeldwell=10
  70.  
  71. # Do we split channels between cards on the same spectrum?  This means if
  72. # multiple 802.11b capture sources are defined, they will be offset to cover
  73. # the most possible spectrum at a given time.  This also controls splitting
  74. # fine-tuned sourcechannels lines which cover multiple interfaces (see below)
  75. channelsplit=true
  76.  
  77. # Basic channel hopping control:
  78. # These define the channels the cards hop through for various frequency ranges
  79. # supported by Kismet.   More finegrain control is available via the
  80. # "sourcechannels" configuration option.
  81. #
  82. # Don't change the IEEE80211<x> identifiers or channel hopping won't work.
  83.  
  84. # Users outside the US might want to use this list:
  85. # defaultchannels=IEEE80211b:1,7,13,2,8,3,14,9,4,10,5,11,6,12
  86. defaultchannels=IEEE80211b:1,6,11,2,7,3,8,4,9,5,10
  87.  
  88. # 802.11g uses the same channels as 802.11b...
  89. defaultchannels=IEEE80211g:1,6,11,2,7,3,8,4,9,5,10
  90.  
  91. # 802.11a channels are non-overlapping so sequential is fine.  You may want to
  92. # adjust the list depending on the channels your card actually supports.
  93. # defaultchannels=IEEE80211a:36,40,44,48,52,56,60,64,100,104,108,112,116,120,124,128,132,136,140,149,153,157,161,184,188,192,196,200,204,208,212,216
  94. defaultchannels=IEEE80211a:36,40,44,48,52,56,60,64
  95.  
  96. # Combo cards like Atheros use both 'a' and 'b/g' channels.  Of course, you
  97. # can also explicitly override a given source.  You can use the script
  98. # extras/listchan.pl to extract all the channels your card supports.
  99. defaultchannels=IEEE80211ab:1,6,11,2,7,3,8,4,9,5,10,36,40,44,48,52,56,60,64
  100.  
  101. # Fine-tuning channel hopping control:
  102. # The sourcechannels option can be used to set the channel hopping for
  103. # specific interfaces, and to control what interfaces share a list of
  104. # channels for split hopping.  This can also be used to easily lock
  105. # one card on a single channel while hopping with other cards.
  106. # Any card without a sourcechannel definition will use the standard hopping
  107. # list.
  108. # sourcechannels=sourcename[,sourcename]:ch1,ch2,ch3,...chN
  109.  
  110. # ie, for us channels on the source 'prism2source' (same as normal channel
  111. # hopping behavior):
  112. # sourcechannels=prism2source:1,6,11,2,7,3,8,4,9,5,10
  113.  
  114. # Given two capture sources, "prism2a" and "prism2b", we want prism2a to stay
  115. # on channel 6 and prism2b to hop normally.  By not setting a sourcechannels
  116. # line for prism2b, it will use the standard hopping.
  117. # sourcechannels=prism2a:6
  118.  
  119. # To assign the same custom hop channel to multiple sources, or to split the
  120. # same custom hop channel over two sources (if splitchannels is true), list
  121. # them all on the same sourcechannels line:
  122. # sourcechannels=prism2a,prism2b,prism2c:1,6,11
  123.  
  124. # Port to serve GUI data
  125. tcpport=2501
  126. # People allowed to connect, comma seperated IP addresses or network/mask
  127. # blocks.  Netmasks can be expressed as dotted quad (/255.255.255.0) or as
  128. # numbers (/24)
  129. allowedhosts=127.0.0.1
  130. # Address to bind to.  Should be an address already configured already on
  131. # this host, reverts to INADDR_ANY if specified incorrectly.
  132. bindaddress=127.0.0.1
  133. # Maximum number of concurrent GUI's
  134. maxclients=5
  135.  
  136. # Do we have a GPS?
  137. gps=false
  138. # Host:port that GPSD is running on.  This can be localhost OR remote!
  139. gpshost=localhost:2947
  140. # Do we lock the mode?  This overrides coordinates of lock "0", which will
  141. # generate some bad information until you get a GPS lock, but it will
  142. # fix problems with GPS units with broken NMEA that report lock 0
  143. gpsmodelock=false
  144.  
  145. # Packet filtering options:
  146. # filter_tracker - Packets filtered from the tracker are not processed or
  147. #                  recorded in any way.
  148. # filter_dump    - Packets filtered at the dump level are tracked, displayed,
  149. #                  and written to the csv/xml/network/etc files, but not
  150. #                  recorded in the packet dump
  151. # filter_export  - Controls what packets influence the exported CSV, network,
  152. #                  xml, gps, etc files.
  153. # All filtering options take arguments containing the type of address and
  154. # addresses to be filtered.  Valid address types are 'ANY', 'BSSID',
  155. # 'SOURCE', and 'DEST'.  Filtering can be inverted by the use of '!' before
  156. # the address.  For example,
  157. # filter_tracker=ANY(!00:00:DE:AD:BE:EF)
  158. # has the same effect as the previous mac_filter config file option.
  159. # filter_tracker=...
  160. # filter_dump=...
  161. # filter_export=...
  162.  
  163. # Alerts to be reported and the throttling rates.
  164. # alert=name,throttle/unit,burst/unit
  165. # The throttle/unit describes the number of alerts of this type that are
  166. # sent per time unit.  Valid time units are second, minute, hour, and day.
  167. # Burst rates control the number of packets sent at a time
  168. # For example:
  169. # alert=FOO,10/min,5/sec
  170. # Would allow 5 alerts per second, and 10 alerts total per minute.
  171. # A throttle rate of 0 disables throttling of the alert.
  172. # See the README for a list of alert types.
  173. alert=NETSTUMBLER,10/min,1/sec
  174. alert=WELLENREITER,10/min,1/sec
  175. alert=LUCENTTEST,10/min,1/sec
  176. alert=DEAUTHFLOOD,10/min,2/sec
  177. alert=BCASTDISCON,10/min,2/sec
  178. alert=CHANCHANGE,5/min,1/sec
  179. alert=AIRJACKSSID,5/min,1/sec
  180. alert=PROBENOJOIN,10/min,1/sec
  181. alert=DISASSOCTRAFFIC,10/min,1/sec
  182. alert=NULLPROBERESP,10/min,1/sec
  183. alert=BSSTIMESTAMP,10/min,1/sec
  184.  
  185. # Known WEP keys to decrypt, bssid,hexkey.  This is only for networks where
  186. # the keys are already known, and it may impact throughput on slower hardware.
  187. # Multiple wepkey lines may be used for multiple BSSIDs.
  188. # wepkey=00:DE:AD:C0:DE:00,FEEDFACEDEADBEEF01020304050607080900
  189.  
  190. # Is transmission of the keys to the client allowed?  This may be a security
  191. # risk for some.  If you disable this, you will not be able to query keys from
  192. # a client.
  193. allowkeytransmit=true
  194.  
  195. # How often (in seconds) do we write all our data files (0 to disable)
  196. writeinterval=300
  197.  
  198. # Do we use sound?
  199. # Not to be confused with GUI sound parameter, this controls wether or not the
  200. # server itself will play sound.  Primarily for headless or automated systems.
  201. sound=false
  202. # Path to sound player
  203. soundplay=/usr/bin/play
  204. # Optional parameters to pass to the player
  205. # soundopts=--volume=.3
  206. # New network found
  207. sound_new=//usr/share/kismet/wav/new_network.wav
  208. # Wepped new network
  209. # sound_new_wep=${prefix}/com/kismet/wav/new_wep_network.wav
  210. # Network traffic sound
  211. sound_traffic=//usr/share/kismet/wav/traffic.wav
  212. # Network junk traffic found
  213. sound_junktraffic=//usr/share/kismet/wav/junk_traffic.wav
  214. # GPS lock aquired sound
  215. # sound_gpslock=//usr/share/kismet/wav/foo.wav
  216. # GPS lock lost sound
  217. # sound_gpslost=//usr/share/kismet/wav/bar.wav
  218. # Alert sound
  219. sound_alert=//usr/share/kismet/wav/alert.wav
  220.  
  221. # Does the server have speech? (Again, not to be confused with the GUI's speech)
  222. speech=false
  223. # Server's path to Festival
  224. festival=/usr/bin/festival
  225. # Are we using festival lite?  If so, set the above "festival" path to also
  226. # point to the "flite" binary
  227. flite=false
  228. # How do we speak?  Valid options:
  229. # speech    Normal speech
  230. # nato      NATO spellings (alpha, bravo, charlie)
  231. # spell     Spell the letters out (aye, bee, sea)
  232. speech_type=nato
  233. # speech_encrypted and speech_unencrypted - Speech templates
  234. # Similar to the logtemplate option, this lets you customize the speech output.
  235. # speech_encrypted is used for an encrypted network spoken string
  236. #
  237. # %b is replaced by the BSSID (MAC) of the network
  238. # %s is replaced by the SSID (name) of the network
  239. # %c is replaced by the CHANNEL of the network
  240. # %r is replaced by the MAX RATE of the network
  241. speech_encrypted=New network detected, s.s.i.d. %s, channel %c, network encrypted.
  242. speech_unencrypted=New network detected, s.s.i.d. %s, channel %c, network open.
  243.  
  244. # Where do we get our manufacturer fingerprints from?  Assumed to be in the
  245. # default config directory if an absolute path is not given.
  246. ap_manuf=ap_manuf
  247. client_manuf=client_manuf
  248.  
  249. # Use metric measurements in the output?
  250. metric=false
  251.  
  252. # Do we write waypoints for gpsdrive to load?  Note:  This is NOT related to
  253. # recent versions of GPSDrive's native support of Kismet.
  254. waypoints=false
  255. # GPSDrive waypoint file.  This WILL be truncated.
  256. waypointdata=%h/.gpsdrive/way_kismet.txt
  257. # Do we want ESSID or BSSID as the waypoint name ?
  258. waypoint_essid=false
  259.  
  260. # How many alerts do we backlog for new clients?  Only change this if you have
  261. # a -very- low memory system and need those extra bytes, or if you have a high
  262. # memory system and a huge number of alert conditions.
  263. alertbacklog=50
  264.  
  265. # File types to log, comma seperated
  266. # dump    - raw packet dump
  267. # network - plaintext detected networks
  268. # csv     - plaintext detected networks in CSV format
  269. # xml     - XML formatted network and cisco log
  270. # weak    - weak packets (in airsnort format)
  271. # cisco   - cisco equipment CDP broadcasts
  272. # gps     - gps coordinates
  273. logtypes=dump,network,csv,xml,weak,cisco,gps
  274.  
  275. # Do we track probe responses and merge probe networks into their owners?
  276. # This isn't always desireable, depending on the type of monitoring you're
  277. # trying to do.
  278. trackprobenets=true
  279.  
  280. # Do we log "noise" packets that we can't decipher?  I tend to not, since
  281. # they don't have anything interesting at all in them.
  282. noiselog=false
  283.  
  284. # Do we log corrupt packets?  Corrupt packets have enough header information
  285. # to see what they are, but someting is wrong with them that prevents us from
  286. # completely dissecting them.  Logging these is usually not a bad idea.
  287. corruptlog=true
  288.  
  289. # Do we log beacon packets or do we filter them out of the dumpfile
  290. beaconlog=true
  291.  
  292. # Do we log PHY layer packets or do we filter them out of the dumpfile
  293. phylog=true
  294.  
  295. # Do we mangle packets if we can decrypt them or if they're fuzzy-detected
  296. mangledatalog=true
  297.  
  298. # Do we do "fuzzy" crypt detection?  (byte-based detection instead of 802.11
  299. # frame headers)
  300. # valid option: Comma seperated list of card types to perform fuzzy detection
  301. #  on, or 'all'
  302. fuzzycrypt=wtapfile,wlanng,wlanng_legacy,wlanng_avs,hostap,wlanng_wext,ipw2200,ipw2915
  303.  
  304. # Do we use network-classifier fuzzy-crypt detection?  This means we expect
  305. # packets that are associated with an encrypted network to be encrypted too,
  306. # and we process them by the same fuzzy compare.
  307. # This essentially replaces the fuzzycrypt per-source option.
  308. netfuzzycrypt=true
  309.  
  310. # What type of dump do we generate?
  311. # valid option: "wiretap"
  312. dumptype=wiretap
  313. # Do we limit the size of dump logs?  Sometimes ethereal can't handle big ones.
  314. # 0 = No limit
  315. # Anything else = Max number of packets to log to a single file before closing
  316. # and opening a new one.
  317. dumplimit=0
  318.  
  319. # Do we write data packets to a FIFO for an external data-IDS (such as Snort)?
  320. # See the docs before enabling this.
  321. #fifo=/tmp/kismet_dump
  322.  
  323. # Default log title
  324. logdefault=Kismet
  325.  
  326. # logtemplate - Filename logging template.
  327. # This is, at first glance, really nasty and ugly, but you'll hardly ever
  328. # have to touch it so don't complain too much.
  329. #
  330. # %n is replaced by the logging instance name
  331. # %d is replaced by the current date as Mon-DD-YYYY
  332. # %D is replaced by the current date as YYYYMMDD
  333. # %t is replaced by the starting log time
  334. # %i is replaced by the increment log in the case of multiple logs
  335. # %l is replaced by the log type (dump, status, crypt, etc)
  336. # %h is replaced by the home directory
  337. # ie, "netlogs/%n-%d-%i.dump" called with a logging name of "Pok" could expand
  338. # to something like "netlogs/Pok-Dec-20-01-1.dump" for the first instance and
  339. # "netlogs/Pok-Dec-20-01-2.%l" for the second logfile generated.
  340. # %h/netlots/%n-%d-%i.dump could expand to
  341. # /home/foo/netlogs/Pok-Dec-20-01-2.dump
  342. #
  343. # Other possibilities:  Sorting by directory
  344. # logtemplate=%l/%n-%d-%i
  345. # Would expand to, for example,
  346. # dump/Pok-Dec-20-01-1
  347. # crypt/Pok-Dec-20-01-1
  348. # and so on.  The "dump", "crypt", etc, dirs must exist before kismet is run
  349. # in this case.
  350. logtemplate=/var/log/kismet/%n-%d-%i.%l
  351.  
  352. # Where do we store the pid file of the server?
  353. piddir=/var/run/
  354.  
  355. # Where state info, etc, is stored.  You shouldnt ever need to change this.
  356. # This is a directory.
  357. configdir=/var/lib/kismet/
  358.  
  359. # cloaked SSID file.  You shouldn't ever need to change this.
  360. ssidmap=ssid_map
  361.  
  362. # Group map file.  You shouldn't ever need to change this.
  363. groupmap=group_map
  364.  
  365. # IP range map file.  You shouldn't ever need to change this.
  366. ipmap=ip_map

advertising

Update the Post

Either update this post and resubmit it with changes, or make a new post.

You may also comment on this post.

update paste below
details of the post (optional)

Note: Only the paste content is required, though the following information can be useful to others.

Save name / title?

(space separated, optional)



Please note that information posted here will not expire by default. If you do not want it to expire, please set the expiry time above. If it is set to expire, web search engines will not be allowed to index it prior to it expiring. Items that are not marked to expire will be indexable by search engines. Be careful with your passwords. All illegal activities will be reported and any information will be handed over to the authorities, so be good.

comments powered by Disqus
worth-right
worth-right
worth-right