Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

ncoffey

macrumors regular
Original poster
Feb 18, 2005
106
0
Warning: I assume no responsibility for anything that happens if you try this alpha software. It's not even a real alpha release of kismac.

I can't seem to get this to work on my Mac Mini with Airport Extreme. It loads up and I can select the passive driver but when I start scanning, it can't load the driver. Then the airport extreme driver isn't loaded up again and the computer has to be restarted. If anybody's interested in experimenting:

http://binaervarianz.de/downloads.php/redir.html?action=download&mirror=http&file_id=36

Edit: I got it to work by disabling automatic airport connection and disconnecting my ethernet cable when i restarted. Now it works like a charm.
 
Interesting! Passive scanning on an Airport Extreme FINALLY?! I was beginning to wonder if it would ever be a reality...

Oh what the heck, I'll be a guinea pig. :D
 
Hemingray said:
Interesting! Passive scanning on an Airport Extreme FINALLY?! I was beginning to wonder if it would ever be a reality...

Oh what the heck, I'll be a guinea pig. :D


Please let us know how this goes... Not sure if I can guinea pig it.
 
works great for me, i've got a new 14' iBook. passive mode let me find the ssid of a hidden network.
Where can i find how to use the other tools in kismac? how do i know when to use which crack?
 
aswitcher said:
Please let us know how this goes... Not sure if I can guinea pig it.

Okay, when I launched Kismac it gave me an error that it couldn't locate a driver. I hit okay, then went into drivers under Preferences and added the Airport Extreme Passive Mode, then quit Kismac. I turned off my Airport card, then relaunched Kismac, went to start scanning, and it prompted me for the admin password to switch out drivers. Sure enough, it worked! I was actually collecting data with my Airport Extreme card. Woohoo!

The only downside is it didn't reload the original driver upon quitting, so I had to restart in order for the system to recognize I had an Airport card again. Aside from that, this looks very promising!

Thanks for the link ncoffey!
 
Jomoma said:
works great for me, i've got a new 14' iBook. passive mode let me find the ssid of a hidden network.
Where can i find how to use the other tools in kismac? how do i know when to use which crack?

No idea. I've only seen data packets on my own network and I'm using WPA2 so I'm not sure. Maybe I'll downgrade to WEP for a few days to try this out.
 
Hemingray said:
Okay, when I launched Kismac it gave me an error that it couldn't locate a driver. I hit okay, then went into drivers under Preferences and added the Airport Extreme Passive Mode, then quit Kismac. I turned off my Airport card, then relaunched Kismac, went to start scanning, and it prompted me for the admin password to switch out drivers. Sure enough, it worked! I was actually collecting data with my Airport Extreme card. Woohoo!

The only downside is it didn't reload the original driver upon quitting, so I had to restart in order for the system to recognize I had an Airport card again. Aside from that, this looks very promising!

Thanks for the link ncoffey!


Nice. Thanks. Wel as soon as that reload original drivers thing is sorted out I'll start playing.
 
Ah, too bad I still have the original AirPort card.

But my next Mac will be a portable so I'm glad to hear that they might have finally sorted this out.
 
aswitcher said:
Nice. Thanks. Wel as soon as that reload original drivers thing is sorted out I'll start playing.

Well, after playing with it a bit more it appears to be behaving itself now! As long as you turn off Airport before launching Kismac, when you start the scan it will prompt you for your password to load the special driver, and when you quit it will swap it back and you can turn Airport back on as normal.

I think what my problem was was using a special driver for my secondary card, a D-Link DWL-122. Once I removed the driver and just used Kismac's, it worked beautifully. I even cracked my home network. Yay! :rolleyes: :D
 
Lord Blackadder said:
Ah, too bad I still have the original AirPort card.

But my next Mac will be a portable so I'm glad to hear that they might have finally sorted this out.

You do know Kismac has always supported the original Airport card in passive, right?
 
Jomoma said:
works great for me, i've got a new 14' iBook. passive mode let me find the ssid of a hidden network.
Where can i find how to use the other tools in kismac? how do i know when to use which crack?

My thoughts exactly... It does say on the homepage " This program is not intended for novices, but for professional users. Take this as a warning" but still... where´s my "kismac for dummies?"

-Squirrel
 
Just as a heads up, I had the toughest time getting the passive mode driver to work in Kismac R75 on Tiger until I found out I needed to upgrade to at least 10.4.2(up'd to 10.4.3). Then it worked like a charm! Up until then I was getting "could not enable monitor mode for Apple Extreme".
 
Cool.
I just picked up a netgear ma111 to use with kismac, wish I'd seen this thread before buying. I don't see R75 available at the kismac site, though, only through your link.
 
I set up my old router with 104 bit encryption, and then cracked the key in 4 3/4 days using my ibook. Kind of scary!! So I then double checked that my new router had only allowed my mac addresses and that it was using wpa. should make it a bit more secure. but to think i have just been using wep by itself for the first two years, who knows what could have happened :confused:
 
iMac Intel Core Duo 2GHz.

Has anyone got KisMAC running under the Intel Core Duo 2GHz?
I states that the drive has loaded but can't open the Monitor Mode..
Any idea?
 
aldenwoods said:
Has anyone got KisMAC running under the Intel Core Duo 2GHz?
I states that the drive has loaded but can't open the Monitor Mode..
Any idea?
I am getting the same error. In for an answer :D
 
If you're intimidated by SVN, I have a binary I compiled on my MacBook. Intel-only KisMAC R115. You use this at your own risk; if it messes up your machine, don't complain to me. I just compiled it, and so far it's working well.

edit: updated link to reflect URL changes
 
So, are you saying that passive mode will enable me to collect packets from nearby networks? I'm assuming that I must disconnect from my current network while doing this?

If there were any networks in range I might try it out, but I think I will wait until all the issues are sorted out.

Is there anything else cool you can do with this?
 
they have ppc binaries on the website i listed, it woeks fine in passive with airport extreme on my ibook, and yes you do need to disconnect from your network to be able to scan
 
nrd said:
If you're intimidated by SVN, I have a binary I compiled on my MacBook. Intel-only KisMAC R106. You use this at your own risk; if it messes up your machine, don't complain to me. I just compiled it, and so far it's working well.

Does this contain the drivers for the Atheros card found in the Intel iMac and the MBP? Or is this simply an Intel binary with the Broadcom drivers found in previous Airport equipped Macs (and therefore of little use to Intel Mac owners)?

BB
 
it's still absolutely pointless... You need to be able to use a card that lets you inject fake authentication requests, and then reinject the packets.

without that you have to wait months, and weeks to manually collect enough packets to crack a network...

for now just get yourself a $20 pc card that supported.
 
Bunsen Burner said:
Does this contain the drivers for the Atheros card found in the Intel iMac and the MBP? Or is this simply an Intel binary with the Broadcom drivers found in previous Airport equipped Macs (and therefore of little use to Intel Mac owners)?

BB

I checked it out from SVN and I do believe that that includes the additional drivers. This does work with Airport Extreme on my Intel Mac, but I don't have any other wifi devices to test it with.
 
inkhead said:
it's still absolutely pointless... You need to be able to use a card that lets you inject fake authentication requests, and then reinject the packets.

without that you have to wait months, and weeks to manually collect enough packets to crack a network...

for now just get yourself a $20 pc card that supported.

Thats not entirely true, wep can crack without reinjection in 24 hours(even 128 bit), WPA takes longer
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.