Kismet Hacking

Kismet Hacking, 1st Edition

Kismet Hacking, 1st Edition,Frank Thornton,Michael Schearer,Brad Haines,ISBN9781597491174

  &      &      





235 X 191

The only book on the industry standard for examining wireless network traffic!

Print Book + eBook

USD 71.34
USD 118.90

Buy both together and save 40%

Print Book


In Stock

Estimated Delivery Time
USD 60.95

eBook Overview

VST (VitalSource Bookshelf) format

DRM-free included formats : EPUB, Mobi (for Kindle), PDF

USD 57.95
Add to Cart

Key Features

*Wardrive Running Kismet from the BackTrack Live CD

*Build and Integrate Drones with your Kismet Server

*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive


Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.


New and experienced information security professionals; advanced computer users who are interesting in using Kismet

Frank Thornton

Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."

Affiliations and Expertise

Owner, Blackthorn Systems, New Hampshire, USA

View additional works by Frank Thornton
Information about this author is currently not available.

Brad Haines

Brad "RenderMan" Haines, Contributing Author to RFID Security (ISBN: 978-1-59749-047-4, Syngress) and Kismet Hacking (ISBN: 978-1-59749-117-4, Syngress), is chief researcher of Renderlab.net and co-refounder of "The Church of WiFi" wireless think tank. He currently operates his own consulting company in Edmonton, Alberta, Canada, providing wireless performance and security assessment services for a variety of clients both large and small. A noted expert in the hacker community in the field of wireless security, he has spoken at many international conferences such as Black Hat and DEFCON and taught several classes on free wireless assessment tools. He has also contributed over time to many wireless security tools such as the Kismet wirelss sniffer and coWPAtty.

Affiliations and Expertise

Chief researcher of Renderlab.net

View additional works by Brad Haines

Kismet Hacking, 1st Edition

Introduction / Design Structure - This chapter tells how Kismet functions as well as background information on the design of the different models 2. Basic Install - Covers the installation process, and selection of various wireless cards and other equipment such as GPS receivers and antennas 3. Basic Menus - Details on the main menus for operating Kismet 4. Server .conf File Configuration - Configuration of the Server portion of the program. 5. Client .conf File Configuration - Configuration of the Client and User Interface section of the application. 6. Advanced Configuration - Tweaking and complex uses for cutting edge users 7. Drones - Setting up Drone Kismet servers as for remote operations 8. IDS Setup - How to combine Drones into an advanced Wireless Intrusion Detection System 9. GPSmap - Making Kismet plot where it’s been, and provideing advanced maps and diagrams

Cyber Week Pre-Sale | Use Code CYBOOK15

Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy

Contact Us