Hello I did the two commands "new2dir" & "dir2pet" to create this Kismet .pet package. Will try to add aircrack-ng pet package also. There will be problems and mistakes. I did create a little Kismet_16x16.xpm icon file and put this in under the menu "Networking"
http://www.kismetwireless.net/ The version below in the .PET file is the 2008 RC1 version. As of April 22, 2010 KISMET newcore is a rewrite of the base code and is different. So don't mix and match .conf files. The .PET below will work just fine to record wireless networks around your location.
KISMET, whats that you ask? See this link to article by Joe Barr on Linux.com
http://www.linux.com/feature/139754
An introduction to the Kismet packet sniffer
By Joe Barr on July 03, 2008 (4:00:00 PM)
http://dotpups.de/dotpups/Wifi/wireless-utilities/ older dot pups for downloading aircrack-ng-0.9
AIRCRACK-NG
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
http://www.aircrack-ng.org/doku.php
http://airodump.net/aircrack-ng-optimal ... -cpu-sse2/
This is my second try at making a .PET package report problems back WB7ODYFred via private message. Or voice mail SIP:
fredfinster@sip7.vitelity.net
I will try installing this Kismet.pet on another machine with an ATMEL76_USB chip set wireless dongle.
Be patient with me, comment if it works for you. Together we can work out the problems.
Open an RXVT Terminal window
"perform the two or three commands below one time for initial setup"
# check that there is directory named /home If not create a directory /home
mkdir /home
#add a user name to the computer, example like pat
adduser pat
# create group kismet then add user "pat" to the "kismet" group
addgroup kismet
modgroup -a -G kismet pat
# check that there is now a directory /home/pat if not create it mkdir /home/pat
ls -ld /home/pat
#check for permission owner and group on the directory /home/pat. If "root" ownership change to "pat"
chgrp pat /home/pat
chown pat /home/pat
#you can download the etc_kismet.tar file in /usr/local/etc directory and untar it
edit kismet configuration file to change to user "myuser_name". I used "fredf" for "myuser_name" The above example uses 'pat' for a user name. Edit the type of wireless card used
edit /usr/local/etc/kismet.conf
"perform these commands every time before running kismet. Kismet will not run as user 'root' " So you have to create a regular 'user' . Then change directory to that user name. "cd /home/pat" Start Kismet as the root user, Kismet will launch a daemon and then switch from root to the user name to record the radio packets in a kismet-05-06-2009.dump file.
cd /home/myuser_name or cd /home/pat
kismet
space_bar
ss sort on essid signature name
downarrow key to highlight an access point.
L to lock to this channel and collect packets, looking for Initialization vector (IV) crypted packets
c for clients
i for information about the access point
q little q to quit client or info windows
H to change from Locked to Frequency Hopping
Q capitol Q to quit Kismet application. "You might have to ctrl-c or or close or kill the rxvt window when kismet hangs up"
Next after logging packets with Kismet, you can run Aircrack on 50,000 to 100,000+ IV crypted packets to break out the WEP (wireless encryption protocol ) key, a hex number like "2653174700"
"run aircrack in the same RXVT window after quiting kismet"
aircrack-ng *.dump
or if needing to disable a "solution' use the option -k N where N is 1 to 17
aircrack-ng -k 1 *.dump
aircrack-ng -k 2 *.dump
Download both files etc_kismet.tar and kismet-2008-05-R1-i486.pet to use KISMET