What is Kismet?

Kismet is a wireless network and device detector, sniffer, wardriving tool, and WIDS (wireless intrusion detection) framework. Unlike smartphone apps that use standard WiFi APIs, Kismet can put your wireless adapter into monitor mode, allowing it to see all wireless traffic - not just networks you're connected to.

Originally released in 2001 by Mike Kershaw (dragorn), Kismet has been the go-to tool for serious wardrivers and security professionals for over two decades. It runs on Linux, macOS, and even embedded systems like Raspberry Pi.

The latest version features a modern web-based UI, REST API, remote capture support, and can detect WiFi, Bluetooth, Software Defined Radio signals, and more.

Monitor Mode
Packet Capture
WiFi Detection
Bluetooth Scanning
SDR Support
Web Interface
REST API
Remote Capture
Visit Kismet Website
2001
Since
FOSS
Open Source
6GHz
WiFi 6E Support
PCAP
Packet Capture

Why Choose Kismet?

Monitor Mode

See ALL wireless traffic, not just networks broadcasting. Detect hidden networks, rogue access points, and capture raw packets for analysis.

  • Hidden SSID detection
  • Client device tracking
  • Probe request capture
  • Raw 802.11 frames

Packet Capture

Full PCAP capture for later analysis with tools like Wireshark, Aircrack-ng, or hashcat.

  • Standard PCAP format
  • WPA handshake capture
  • PMKID collection
  • Wireshark compatible

Multi-Source

Combine multiple adapters for better coverage. Use local or remote capture sources.

  • Multiple WiFi adapters
  • Remote capture drones
  • Bluetooth adapters
  • RTL-SDR sources

Advanced Analysis

Deep packet inspection, device fingerprinting, and intrusion detection capabilities.

  • Manufacturer detection
  • Device fingerprinting
  • Alert system (WIDS)
  • GPS correlation

Recommended Hardware

Kismet requires a wireless adapter that supports monitor mode. Here are the best options for 2024-2025.

Adapter Chipset Bands WiFi Standard Interface Price Rating Notes
Alfa AWUS036AXML MediaTek MT7921AU 2.4/5/6 GHz WiFi 6E (802.11ax) USB 3.0 $100 TOP PICK Best overall, 6GHz support, great Linux support
Alfa AWUS036ACH Realtek RTL8812AU 2.4/5 GHz WiFi 5 (802.11ac) USB 3.0 $50 PROVEN Classic choice, excellent aircrack support
Alfa AWUS036ACHM MediaTek MT7610U 2.4/5 GHz WiFi 5 (802.11ac) USB 2.0 $40 COMPACT Smaller form factor, managed mode
Panda PAU09 N600 Ralink RT5572 2.4/5 GHz WiFi 4 (802.11n) USB 2.0 $35 BUDGET Good budget option, dual-band
Alfa AWUS036NHA Atheros AR9271 2.4 GHz WiFi 4 (802.11n) USB 2.0 $30 CLASSIC 2.4GHz only but bulletproof compatibility
TP-Link Archer T3U Plus Realtek RTL8812BU 2.4/5 GHz WiFi 5 (802.11ac) USB 3.0 $25 VALUE Cheap, needs driver install

Laptop Requirements

  • Linux (Kali, Parrot, Ubuntu recommended)
  • USB 3.0 port (for faster adapters)
  • 4GB+ RAM (8GB recommended)
  • SSD storage for capture files
  • USB GPS receiver (GlobalSat BU-353)

GPS Options

  • GlobalSat BU-353-S4 ($30) - USB GPS
  • VK-162 G-Mouse ($15) - Budget USB GPS
  • Garmin GLO 2 ($100) - Bluetooth GPS
  • gpsd daemon for GPS integration

Optional Antennas

  • Alfa 9dBi omnidirectional
  • Alfa 7dBi panel antenna
  • Magnetic mount for vehicles
  • RP-SMA to SMA adapters

Installation Guide

1

Install Dependencies

Kismet requires several packages. On Debian/Ubuntu/Kali:

# Update package list
sudo apt update

# Install build dependencies
sudo apt install build-essential git libwebsockets-dev \
    pkg-config zlib1g-dev libnl-3-dev libnl-genl-3-dev \
    libcap-dev libpcap-dev libnm-dev libdw-dev \
    libsqlite3-dev libprotobuf-dev libprotobuf-c-dev \
    protobuf-compiler protobuf-c-compiler libsensors4-dev \
    libusb-1.0-0-dev python3 python3-setuptools \
    python3-protobuf python3-requests python3-numpy \
    python3-serial python3-usb python3-dev
2

Install from Repository

The easiest method - use the Kismet repository:

# Add Kismet repository
wget -O - https://www.kismetwireless.net/repos/kismet-release.gpg.key --quiet | \
    gpg --dearmor | \
    sudo tee /usr/share/keyrings/kismet-archive-keyring.gpg

echo 'deb [signed-by=/usr/share/keyrings/kismet-archive-keyring.gpg] https://www.kismetwireless.net/repos/apt/release/$(lsb_release -cs) $(lsb_release -cs) main' | \
    sudo tee /etc/apt/sources.list.d/kismet.list

# Install Kismet
sudo apt update && sudo apt install kismet
3

Configure User Permissions

Add your user to the kismet group for capture permissions:

# Add user to kismet group
sudo usermod -aG kismet $USER

# Log out and back in, or run:
newgrp kismet

# Verify group membership
groups
4

Configure GPS (Optional)

Set up gpsd for GPS integration:

# Install gpsd
sudo apt install gpsd gpsd-clients

# Configure gpsd (edit /etc/default/gpsd)
sudo nano /etc/default/gpsd

# Set: DEVICES="/dev/ttyUSB0"
# Set: GPSD_OPTIONS="-n"

# Start gpsd
sudo systemctl enable gpsd
sudo systemctl start gpsd

# Test GPS
gpsmon

Using Kismet

Basic Usage

Start Kismet with your wireless interface:

# Start Kismet (it will handle monitor mode)
kismet -c wlan0

# Or specify multiple sources
kismet -c wlan0 -c wlan1

# With specific options
kismet -c wlan0:name=Alfa,hop=true,channels="1,6,11"

Access the web interface at http://localhost:2501

Advanced Configuration

Edit kismet.conf for persistent settings:

# /etc/kismet/kismet.conf or ~/.kismet/kismet.conf

# Define capture sources
source=wlan0:name=MainAdapter,hop=true

# GPS configuration
gps=gpsd:host=localhost,port=2947

# Logging options
log_prefix=/home/user/kismet-logs
log_types=kismet,pcapng,wiglecsv

# Web UI password (first run creates this)
httpd_username=admin
httpd_password=yourpassword

Exporting Data

Kismet can export in multiple formats:

# Kismet saves to .kismet SQLite database by default
# Convert to WiGLE CSV for upload:
kismetdb_to_wiglecsv --in capture.kismet --out wigle.csv

# Extract PCAP from database:
kismetdb_to_pcap --in capture.kismet --out packets.pcap

# Export to KML for Google Earth:
kismetdb_to_kml --in capture.kismet --out networks.kml

Pro Tips

Channel Hopping

Configure channel hopping strategy for best coverage:

  • 2.4GHz: Channels 1, 6, 11 (non-overlapping)
  • 5GHz: Focus on DFS channels for less noise
  • 6GHz: Requires WiFi 6E capable adapter
  • Use multiple adapters for simultaneous coverage

Performance

Optimize Kismet for long wardriving sessions:

  • Use SSD for log storage
  • Disable unnecessary log types
  • Limit PCAP to specific networks
  • Run headless with REST API

Security Research

Use captured data responsibly for security research:

  • WPA handshakes for testing your own networks
  • PMKID attacks (authorized testing only)
  • Rogue AP detection
  • Never attack networks you don't own

Integration

Kismet works with other tools:

  • Wireshark for packet analysis
  • Aircrack-ng for WPA testing
  • hashcat for password recovery
  • WiGLE.net for global mapping