KisMAC,  The ultimate WIFI Stumbler

 


KisMAC  Tutorial


  KisMAC How to


  1: read this page completely. Do not download it now!

  2: Repeat, you’ll save and efforts!

 

For Mac OS Leopard 10.5               Download          KisMAC 0.2.99

For Mac OS Snow Leopard  10.6+   Download          KisMAC 0.3 +

         KisMAC 0.3 + does not work with Leopard 10.5



KisMAC is a free wireless network discovery and has a wide range of powerful capabilities: Detection, Deauthentication, De-cloacking, Passive Scanning Mode,  Re-injection, GPS, and the ability to crack WPA and WEP keys. Not to mention PCAP, CAP or Dumplogs, GPS and export multi format.

KisMAC is really powerful and leave NetStumbler in the dust.

KisMAC is not for beginners and the first step with KisMAC is to read the FAQ. The second step is to read the FAQ again. Once again: read, repeat, play. 99% of the issues are user related.



WEP Crack in passive mode

Without Re-injection device (AirPort or AirPort Extreme Card only)


Before you start, give us a little love  ;-)  =>



  1.   Install KisMAC

  2.   Start KisMAC


Go to KisMAC >>> PREFERENCES>>> DRIVERS




A dialog box opens and loads the driver card. An Admin password may be required.



Look for a network with a WEP key (column "ENC"), with a good signal and an active network (see "Packets" and "Data")

OR

  1.   Enter "WEP" in the search box (top right) and select "ENCRYPTION" to filter the networks





If the column ENC is "NO", the network is open: No need to crack anything.

Once you have selected a network, look at the network channel, ie 1, 2, etc ...

Back to PREFERENCES>>>> Drivers and select only the selected network ie a


In "passive" mode you are dependent on the network traffic. If the network is not very active, you may have to scan for several hours. Passive mode is like harvesting the rain: The more it rains, the more you can collect.  If it does not rain, or very little ... you have to be patient. But on the other hand, Passive Mode is completely stealth, undetectable, and does not interfere with the networks


So be patient.



Let KisMAC scan to collect enough IV's (Initialization Vectors)

You need to collect a minimum of 130 000 unique IVs before starting a crack WEP 40/64

Recommended:

200,000 unique IV for WEP 40/64

1000000 unique IV for WEP 104/128

In passive mode, it may take some time ....

You can attempt with less, but there is no warranty that it will work. The more IVs, the greater your chances to recover the key.



Once you have collected enough IV’s, select "NETWORK">> "CRACK">> "AGAINST BOTH"

It may take between 5 to 20 minutes,  depending on your machine,  for KisMAC to attempt to crack the WEP key.  The fastest I have witnessed was 3 seconds. 





     ☞ Read the notes at the end of this article.






WEP Crack with Re-injection


 RE-injection is a technique used to capture a certain type of packets and re-injected them in the network to artificially increases the number of IVs collected,

With Re-injection, it takes generally 15 to 30 minutes to capture enough IVs,  sometimes less.

Apple Airport cards can not,  to this day, re-inject packets.  In order to do this you NEED a specific USB WLAN card.

Be careful here, not all cards will work: The Chipset and the type and model is what will determine success or failure.

We highly suggest that you READ the REVIEWS before buying a piece of junk. 

Whatever you do, if you have an injection device (wireless card or USB adapter) Do not install the drivers for the USB card.


               => Do not install the drivers from the CD that came with the card <=



  1.   Connect your USB card

  2.   Start KiMAC

 

KisMAC tab>>> PREFERENCES>>> DRIVERS



On the main screen, select "START SCAN"


Look for a network with a WEP key (column "ENC"), with a good signal and a network of active (see "Packets" and "Data")


Once you have selected a network, look at the network channel, ie 1, 2, etc ...

Back>>> PREFERENCES>>> DRIVERS

Select only the selected network ie a


Let KisMAC scan for several minutes and determine what networks are active.

On the "Network" tab, select "RE-INJECTION Packet" and wait a bit ...


Example: KisMAC  Waiting for "interesting packets"




WEP Injection, 131 responses, Re-injecting



KisMAC will now try to inject packets to accelerate the process

Keep an eye on the "unique IV" number once it has reached at least 130,000 (200,000 is recommended), you can begin to consider a crack.



Once you have collected enough IV’s, select "NETWORK">> "CRACK">> "AGAINST BOTH"

It may take between 5 to 20 minutes,  depending on your machine,  for KisMAC to attempt to crack the WEP key.  The fastest I have witnessed was 3 seconds. 










Video Tutorial















Notes

For Mac OS X 10.5     Leopard           Download  KisMAC 0.2.99

For Mac OS X 10.6+   Snow Leopard  Download  KisMAC 0.3+  


If you are really lost in the maze, you may consider The KisMAC School: an individual course via iChat screen sharing. 1 hour course, with all the solutions to your problems.

Classes are either in French or in English and cost about ~ 17 euros / $ 25

Details below



Keys or WEP Key

The WEP key is either 64 or 128-bit, sometimes in ASCII. The key must be entered without the semicolon. Ex: a key 70:61:62:6C:6E must be entered exactly as    7061626C6F

Alternatively, the key in ASCII stands for "pablo"


WEP 40/64  104/128


A WEP key 64-bit is in fact a 40-bit + 24 initialization bit.  Calling that 64 is pure marketing.  Ditto with 128-bit  (104+24)


WEP 256 or 528

They exist but they are rare ....



KisMAC School. One to One


One hour can help you save a lot of trouble


Tutoring, Via iChat, screen sharing and voice.

KisMAC for beginners, step by step.

KisMAC  WEP & WPA

KisMAC Problems and Solutions

KisMAC Flood Attacks, Dehauth, etc.

Aircrack-ng native on Mac

Wireshark packet decryption

JTR (John The Ripper)

JTR bruteforce Pipe To Aircrack-ng

 

 
  1. Select your card driver: AirPort Extreme Card, Passive Mode


  1. Click "ADD"


  1. Select the channels, usually 1-11

channels 12-14 can create problems.


  1. Close the dialog box and select "START SCAN" on the main window

  1.   Select your Card USB Chipset : Example: "USB RT73"


  1. Click "ADD"


  1. Check "USE AS PRIMARY DEVICE"


Select only channels 1-11 If you are in the USA, 1-13 If you are in Europe, 1-14, if you are in Japan. In some cases, the channels Ch 12-14 can create a crash: limit yourself to channels 1-11


  1. Check the "KEEP EVERYTHING"


  1. Close Dialog box