kismet.conf 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281
  1. # Kismet config file
  2. # Most of the "static" configs have been moved to here -- the command line
  3. # config was getting way too crowded and cryptic. We want functionality,
  4. # not continually reading --help!
  5. # Version of Kismet config
  6. version=2005.01.R1
  7. # Name of server (Purely for organiational purposes)
  8. servername=Kismet
  9. # User to setid to (should be your normal user)
  10. suiduser=nobody
  11. # Sources are defined as:
  12. # source=cardtype,interface,name[,initialchannel]
  13. # Card types and required drivers are listed in the README.
  14. # The initial channel is optional, if hopping is not enabled it can be used
  15. # to set the channel the interface listens on.
  16. # YOU MUST CHANGE THIS TO BE THE SOURCE YOU WANT TO USE
  17. source=wrt54g,eth1,wireless
  18. # For v1 hardware uncomment this:
  19. # source=wrt54g,eth2,wireless
  20. # Comma-separated list of sources to enable. This is only needed if you defined
  21. # multiple sources and only want to enable some of them. By default, all defined
  22. # sources are enabled.
  23. # For example:
  24. # enablesources=prismsource,ciscosource
  25. # Do we channelhop?
  26. channelhop=true
  27. # How many channels per second do we hop? (1-10)
  28. channelvelocity=5
  29. # By setting the dwell time for channel hopping we override the channelvelocity
  30. # setting above and dwell on each channel for the given number of seconds.
  31. #channeldwell=10
  32. # Do we split channels between cards on the same spectrum? This means if
  33. # multiple 802.11b capture sources are defined, they will be offset to cover
  34. # the most possible spectrum at a given time. This also controls splitting
  35. # fine-tuned sourcechannels lines which cover multiple interfaces (see below)
  36. channelsplit=true
  37. # Basic channel hopping control:
  38. # These define the channels the cards hop through for various frequency ranges
  39. # supported by Kismet. More finegrain control is available via the
  40. # "sourcechannels" configuration option.
  41. #
  42. # Don't change the IEEE80211<x> identifiers or channel hopping won't work.
  43. # Users outside the US might want to use this list:
  44. # defaultchannels=IEEE80211b:1,7,13,2,8,3,14,9,4,10,5,11,6,12
  45. defaultchannels=IEEE80211b:1,6,11,2,7,3,8,4,9,5,10
  46. # 802.11g uses the same channels as 802.11b...
  47. defaultchannels=IEEE80211g:1,6,11,2,7,3,8,4,9,5,10
  48. # 802.11a channels are non-overlapping so sequential is fine. You may want to
  49. # adjust the list depending on the channels your card actually supports.
  50. # defaultchannels=IEEE80211a:36,40,44,48,52,56,60,64,100,104,108,112,116,120,124,128,132,136,140,149,153,157,161,184,188,192,196,200,204,208,212,216
  51. defaultchannels=IEEE80211a:36,40,44,48,52,56,60,64
  52. # Combo cards like Atheros use both 'a' and 'b/g' channels. Of course, you
  53. # can also explicitly override a given source. You can use the script
  54. # extras/listchan.pl to extract all the channels your card supports.
  55. defaultchannels=IEEE80211ab:1,6,11,2,7,3,8,4,9,5,10,36,40,44,48,52,56,60,64
  56. # Fine-tuning channel hopping control:
  57. # The sourcechannels option can be used to set the channel hopping for
  58. # specific interfaces, and to control what interfaces share a list of
  59. # channels for split hopping. This can also be used to easily lock
  60. # one card on a single channel while hopping with other cards.
  61. # Any card without a sourcechannel definition will use the standard hopping
  62. # list.
  63. # sourcechannels=sourcename[,sourcename]:ch1,ch2,ch3,...chN
  64. # ie, for us channels on the source 'prism2source' (same as normal channel
  65. # hopping behavior):
  66. # sourcechannels=prism2source:1,6,11,2,7,3,8,4,9,5,10
  67. # Given two capture sources, "prism2a" and "prism2b", we want prism2a to stay
  68. # on channel 6 and prism2b to hop normally. By not setting a sourcechannels
  69. # line for prism2b, it will use the standard hopping.
  70. # sourcechannels=prism2a:6
  71. # To assign the same custom hop channel to multiple sources, or to split the
  72. # same custom hop channel over two sources (if splitchannels is true), list
  73. # them all on the same sourcechannels line:
  74. # sourcechannels=prism2a,prism2b,prism2c:1,6,11
  75. # Port to serve GUI data
  76. tcpport=2501
  77. # People allowed to connect, comma seperated IP addresses or network/mask
  78. # blocks. Netmasks can be expressed as dotted quad (/255.255.255.0) or as
  79. # numbers (/24)
  80. allowedhosts=127.0.0.1
  81. # Maximum number of concurrent GUI's
  82. maxclients=5
  83. # Do we have a GPS?
  84. gps=false
  85. # Host:port that GPSD is running on. This can be localhost OR remote!
  86. gpshost=localhost:2947
  87. # Do we lock the mode? This overrides coordinates of lock "0", which will
  88. # generate some bad information until you get a GPS lock, but it will
  89. # fix problems with GPS units with broken NMEA that report lock 0
  90. gpsmodelock=false
  91. # Packet filtering options:
  92. # filter_tracker - Packets filtered from the tracker are not processed or
  93. # recorded in any way.
  94. # filter_dump - Packets filtered at the dump level are tracked, displayed,
  95. # and written to the csv/xml/network/etc files, but not
  96. # recorded in the packet dump
  97. # filter_export - Controls what packets influence the exported CSV, network,
  98. # xml, gps, etc files.
  99. # All filtering options take arguments containing the type of address and
  100. # addresses to be filtered. Valid address types are 'ANY', 'BSSID',
  101. # 'SOURCE', and 'DEST'. Filtering can be inverted by the use of '!' before
  102. # the address. For example,
  103. # filter_tracker=ANY(!00:00:DE:AD:BE:EF)
  104. # has the same effect as the previous mac_filter config file option.
  105. # filter_tracker=...
  106. # filter_dump=...
  107. # filter_export=...
  108. # Alerts to be reported and the throttling rates.
  109. # alert=name,throttle/unit,burst
  110. # The throttle/unit describes the number of alerts of this type that are
  111. # sent per time unit. Valid time units are second, minute, hour, and day.
  112. # Burst describes the number of alerts sent before throttling takes place.
  113. # For example:
  114. # alert=FOO,10/min,5
  115. # Would allow 5 alerts through before throttling is enabled, and will then
  116. # limit the number of alerts to 10 per minute.
  117. # A throttle rate of 0 disables throttling of the alert.
  118. # See the README for a list of alert types.
  119. alert=NETSTUMBLER,5/min,2
  120. alert=WELLENREITER,5/min,2
  121. alert=LUCENTTEST,5/min,2
  122. alert=DEAUTHFLOOD,5/min,4
  123. alert=BCASTDISCON,5/min,4
  124. alert=CHANCHANGE,5/min,4
  125. alert=AIRJACKSSID,5/min,2
  126. alert=PROBENOJOIN,5/min,2
  127. alert=DISASSOCTRAFFIC,5/min,2
  128. alert=NULLPROBERESP,5/min,5
  129. alert=BSSTIMESTAMP,5/min,5
  130. # Known WEP keys to decrypt, bssid,hexkey. This is only for networks where
  131. # the keys are already known, and it may impact throughput on slower hardware.
  132. # Multiple wepkey lines may be used for multiple BSSIDs.
  133. # wepkey=00:DE:AD:C0:DE:00,FEEDFACEDEADBEEF01020304050607080900
  134. # Is transmission of the keys to the client allowed? This may be a security
  135. # risk for some. If you disable this, you will not be able to query keys from
  136. # a client.
  137. allowkeytransmit=true
  138. # How often (in seconds) do we write all our data files (0 to disable)
  139. writeinterval=300
  140. # Where do we get our manufacturer fingerprints from? Assumed to be in the
  141. # default config directory if an absolute path is not given.
  142. ap_manuf=ap_manuf
  143. client_manuf=client_manuf
  144. # Use metric measurements in the output?
  145. metric=false
  146. # Do we write waypoints for gpsdrive to load? Note: This is NOT related to
  147. # recent versions of GPSDrive's native support of Kismet.
  148. waypoints=false
  149. # GPSMap waypoint file. This WILL be truncated.
  150. waypointdata=%h/.gpsdrive/way_kismet.txt
  151. # How many alerts do we backlog for new clients? Only change this if you have
  152. # a -very- low memory system and need those extra bytes, or if you have a high
  153. # memory system and a huge number of alert conditions.
  154. alertbacklog=50
  155. # File types to log, comma seperated
  156. # dump - raw packet dump
  157. # network - plaintext detected networks
  158. # csv - plaintext detected networks in CSV format
  159. # xml - XML formatted network and cisco log
  160. # weak - weak packets (in airsnort format)
  161. # cisco - cisco equipment CDP broadcasts
  162. # gps - gps coordinates
  163. logtypes=dump,network,csv,xml,weak,cisco,gps
  164. # Do we track probe responses and merge probe networks into their owners?
  165. # This isn't always desireable, depending on the type of monitoring you're
  166. # trying to do.
  167. trackprobenets=true
  168. # Do we log "noise" packets that we can't decipher? I tend to not, since
  169. # they don't have anything interesting at all in them.
  170. noiselog=false
  171. # Do we log corrupt packets? Corrupt packets have enough header information
  172. # to see what they are, but someting is wrong with them that prevents us from
  173. # completely dissecting them. Logging these is usually not a bad idea.
  174. corruptlog=true
  175. # Do we log beacon packets or do we filter them out of the dumpfile
  176. beaconlog=true
  177. # Do we log PHY layer packets or do we filter them out of the dumpfile
  178. phylog=true
  179. # Do we mangle packets if we can decrypt them or if they're fuzzy-detected
  180. mangledatalog=true
  181. # Do we do "fuzzy" crypt detection? (byte-based detection instead of 802.11
  182. # frame headers)
  183. # valid option: Comma seperated list of card types to perform fuzzy detection
  184. # on, or 'all'
  185. fuzzycrypt=wtapfile,wlanng,wlanng_legacy,wlanng_avs,hostap,wlanng_wext
  186. # What type of dump do we generate?
  187. # valid option: "wiretap"
  188. dumptype=wiretap
  189. # Do we limit the size of dump logs? Sometimes ethereal can't handle big ones.
  190. # 0 = No limit
  191. # Anything else = Max number of packets to log to a single file before closing
  192. # and opening a new one.
  193. dumplimit=0
  194. # Do we write data packets to a FIFO for an external data-IDS (such as Snort)?
  195. # See the docs before enabling this.
  196. #fifo=/tmp/kismet_dump
  197. # Default log title
  198. logdefault=Kismet
  199. # logtemplate - Filename logging template.
  200. # This is, at first glance, really nasty and ugly, but you'll hardly ever
  201. # have to touch it so don't complain too much.
  202. #
  203. # %n is replaced by the logging instance name
  204. # %d is replaced by the current date as Mon-DD-YYYY
  205. # %D is replaced by the current date as YYYYMMDD
  206. # %t is replaced by the starting log time
  207. # %i is replaced by the increment log in the case of multiple logs
  208. # %l is replaced by the log type (dump, status, crypt, etc)
  209. # %h is replaced by the home directory
  210. # ie, "netlogs/%n-%d-%i.dump" called with a logging name of "Pok" could expand
  211. # to something like "netlogs/Pok-Dec-20-01-1.dump" for the first instance and
  212. # "netlogs/Pok-Dec-20-01-2.%l" for the second logfile generated.
  213. # %h/netlots/%n-%d-%i.dump could expand to
  214. # /home/foo/netlogs/Pok-Dec-20-01-2.dump
  215. #
  216. # Other possibilities: Sorting by directory
  217. # logtemplate=%l/%n-%d-%i
  218. # Would expand to, for example,
  219. # dump/Pok-Dec-20-01-1
  220. # crypt/Pok-Dec-20-01-1
  221. # and so on. The "dump", "crypt", etc, dirs must exist before kismet is run
  222. # in this case.
  223. logtemplate=%n-%d-%i.%l
  224. # Where do we store the pid file of the server?
  225. piddir=/var/run/
  226. # Where state info, etc, is stored. You shouldnt ever need to change this.
  227. # This is a directory.
  228. configdir=%h/.kismet/
  229. # cloaked SSID file. You shouldn't ever need to change this.
  230. ssidmap=ssid_map
  231. # Group map file. You shouldn't ever need to change this.
  232. groupmap=group_map
  233. # IP range map file. You shouldn't ever need to change this.
  234. ipmap=ip_map