[Wi-Fi, BT] Задай вопрос - получи ответ!

Discussion in 'Беспроводные технологии/Wi-Fi/Wardriving' started by Alexsize, 11 Sep 2007.

Thread Status:
Not open for further replies.
  1. Alpha][

    Alpha][ Elder - Старейшина

    Joined:
    19 Oct 2007
    Messages:
    75
    Likes Received:
    5
    Reputations:
    0
    Никто не знает можно ли использовать2640U в качестве простой беспроводной точки доступа . Т.е. я имею ввиду не использовать встроеный АДСЛ модем а воткнуть другой АДСЛ модем в один из Ethernet разьемов ? Будет ли при этом интернет работать ?
     
    #1581 Alpha][, 21 Jan 2009
    Last edited: 21 Jan 2009
  2. savigm

    savigm New Member

    Joined:
    16 Dec 2008
    Messages:
    30
    Likes Received:
    0
    Reputations:
    0
    Я сам на днях обзавелся DSL 2640U, в связи с чем арендованный adsl-модем сдаю завтра, т.к. он больше не нужен, а вообще вполне возможно подключить и его, 2640 в первую очередь маршрутизатор, в итоге получиться связь Wi-Fi - Ethernet - ADSL, главное шлюзы и адреса настроить, все это делается через Web-Интерфейс, по 192.168.1.1, см. мануал.
    А зачем тебе это, чем встроенный ADSL не угадил?
     
    #1582 savigm, 22 Jan 2009
    Last edited: 22 Jan 2009
  3. savigm

    savigm New Member

    Joined:
    16 Dec 2008
    Messages:
    30
    Likes Received:
    0
    Reputations:
    0
    Придя домой и включив openSuse обнаружил ответ на свой вопрос - KBluetooth, обладает всеми возможностями, что мне надо, не то что виндовый менеджер: из всех возможностей отправка одного!!! файлика. KBluetooth же работает ф файловой системой телефона, то-что надо.
     
  4. user_fizik

    user_fizik New Member

    Joined:
    6 Jan 2009
    Messages:
    6
    Likes Received:
    1
    Reputations:
    0

    Ещё несколько вопросов по данной теме. И так интересное высказывание я нашол вот здесь: https://forum.antichat.ru/thread7424-SSID.html

    Автор утверждаетб что: "Для успешного взлома ключа необходимо собрать минимум 200 000 пакетов, если применяется 64-битный ключ шифрования, и минимум 500 000 пакетов для 128-битного. Можно особо не заморачиваться, что перехваченные пакеты должны быть с уникальными IV, так как доля уникальных IV в общем потоке трафика составляет примерно 95%."

    Отсюда вопрос, зачем мы перехватываем только DATA пакеты и игнорируем Beacon? И также не захватываем Managment пакеты? Они разве не сoдержат IVs?

    И ещё, слова: "подойти поближе", т.е. При настройках, где захватываются только DATA пакеты и игнорируются Beacon пакеты, пакеты с векторами инициализации (IVs) собираются слишком медленно, решением проблемы может послужить нахождение такого места, где уровень сигнала будет 90-100% ? Это так ?
     
  5. vetalxh

    vetalxh Elder - Старейшина

    Joined:
    23 Apr 2008
    Messages:
    43
    Likes Received:
    17
    Reputations:
    5
    Нет, ivs содержат только ДАТА пакеты. Их и надо собирать.
    Нет, необходимо "разговорить точку". Читай форум, инфы достаточно
     
    1 person likes this.
  6. ozgrin

    ozgrin New Member

    Joined:
    23 Jan 2009
    Messages:
    1
    Likes Received:
    0
    Reputations:
    0
    Дома нашел незапароленную точку вайфай. Скорость была 4мбита, качалось около 400-500 кбайт/сек. Потом упало до 20кб/сек. Иногда все-таки скорость опять становится большой. На роутере сидит 1 человек и я. Непонятно,почему у меня такая поганая скорость. как сделать больше?
     
  7. Black.Cat

    Black.Cat New Member

    Joined:
    10 Dec 2008
    Messages:
    18
    Likes Received:
    0
    Reputations:
    0
    Вот, нашёл инфу о настройке моей карты http://tinyshell.be/aircrackng/forum/index.php?topic=4217.msg25751#msg25751 но в силу своей слабости в английском и линукс - не понимаю что там.. Помогите пожалуйста.
     
  8. gold-goblin

    gold-goblin Elder - Старейшина

    Joined:
    26 Mar 2007
    Messages:
    917
    Likes Received:
    174
    Reputations:
    3
    подскажите новечку

    решил к своему ноуту прикупить нормальную вай фай карту, да на форуме много по этому написано,но вопросик остался =)
    Вопрос: если в описании вай фай карты написанно к примеру:
    # Шифрование WEP 64/128 бит

    то я не смогу снифать (анализировать) сети с шифрованиями WPA-PSK, WPA2, WPA2-PSK?
     
  9. Ivan1999

    Ivan1999 Member

    Joined:
    2 Jan 2009
    Messages:
    47
    Likes Received:
    13
    Reputations:
    1
    Ты хочешь купить нормальную карту,а что нормального в карте без WPA и скорее всего без G?
     
  10. gold-goblin

    gold-goblin Elder - Старейшина

    Joined:
    26 Mar 2007
    Messages:
    917
    Likes Received:
    174
    Reputations:
    3
    Я нашел инфу об этой карте тут... По этому я испрашиваю так ли это или нет!
    А данные для примера, так так ли это или нет?
     
  11. SaiRus

    SaiRus Elder - Старейшина

    Joined:
    24 Nov 2008
    Messages:
    369
    Likes Received:
    41
    Reputations:
    0
    кто нибудь слышал про стандарт WiMaX и 4G? дело в том что он работает по стандарту IEEE 802.16 и обещают высокую скорость передачи данных...работа через VoIP, но для этого надо приобрести за 28к телефон Yota-WIMaX 4G
    Вопрос: если работа осущевстляется через IEEE 802.16 разве не достаточно простого телефона с модулем Вай-Фай?
     
  12. user_fizik

    user_fizik New Member

    Joined:
    6 Jan 2009
    Messages:
    6
    Likes Received:
    1
    Reputations:
    0
    Спасибо за объяснение товарищь,если я тебя правильно понял,то ты имееш в виду использование пакета AiroWizard ? Так вот при его использовании, точнее Chopchop и Fragmentation, так вот во втором варианте не получается отослать пакет.Пишет: Failed send packet,try another paket. Ситуация повторяется при использовании любых пакетов. ... Есть соображения? Если это не то, что ты имелл в виду, то скажи другой термин,потомучто по этоиу запросу форум ничего не выдаёт...

    И ещё любопытный вопрос, при использование
    Aircrack-ng GUI, всё в порядке, я указываю фаил, выставляю галку se PTW attaсk и к примеру у меня ~ 1000 IVs, но если галку не ставить,а использовать Fudge factor, то колличество IVs возвростает до ~ 200 000 IVs... С чем это связанно?
     
  13. iv.

    iv. Elder - Старейшина

    Joined:
    21 Mar 2007
    Messages:
    1,183
    Likes Received:
    438
    Reputations:
    107
    Модель адаптера так и будешь держать в секрете?
    Нет. Это совсем другой стандарт, другие частоты и т.д. Всё равно что через обычный модем V.90 пытаться прогнать ADSL.
     
  14. SaiRus

    SaiRus Elder - Старейшина

    Joined:
    24 Nov 2008
    Messages:
    369
    Likes Received:
    41
    Reputations:
    0
    iv., скорей вссего вы правы, там исползуется, так называемый WiMaX-модем который работает по стандарту беспроводных сетей только на частотах за 2 ГГц... но сравнение не очень :) пищалка и АДСЛ :) не секрет что до v.90 были еще X2 и K56Flex может нужно их сравнивать?
     
    #1594 SaiRus, 26 Jan 2009
    Last edited: 26 Jan 2009
  15. [kesa]

    [kesa] New Member

    Joined:
    30 Sep 2008
    Messages:
    4
    Likes Received:
    1
    Reputations:
    0
    не могу разшивелить точку в BT3 мне кажется что проблема тут:
    Sending Authentication Request(open sistem)
    Authentication successful[ASK]
    Sending Association Request[ASK]
    Association Successful:) (AID:1)
    что обозначает аббревиатура в скобках?
     
    1 person likes this.
  16. m0sk

    m0sk Member

    Joined:
    27 Oct 2008
    Messages:
    28
    Likes Received:
    7
    Reputations:
    -4
    чем росшифровать ключ wpa ?

    FED95CFB732CE8BB9CC592BB2A29641952F80614DA5C809770CA04E733C4DC4C
     
    1 person likes this.
  17. gold-goblin

    gold-goblin Elder - Старейшина

    Joined:
    26 Mar 2007
    Messages:
    917
    Likes Received:
    174
    Reputations:
    3
    проблема с kismet или драйвером вай-фай

    Решился заняться вардрайвингом.
    Имею на борту ubuntu карточку Intel PRO/Wireless 3945ABG драйвера iwl3945 (не уверен но идут с дистрибютивом)

    Проблема начинается при старте kismet'a
    Отсюда следует что wlan0 не существует? Но этого не может быть так как я получаю через него интернет...
    У кого какие мысли?
     
  18. gold-goblin

    gold-goblin Elder - Старейшина

    Joined:
    26 Mar 2007
    Messages:
    917
    Likes Received:
    174
    Reputations:
    3
    хм здесь кто нибудь отвечает на вопросы или их тут просто складируют???
     
  19. vine

    vine Elder - Старейшина

    Joined:
    2 Feb 2008
    Messages:
    54
    Likes Received:
    4
    Reputations:
    0
    Выложи файл kismet.conf.Будем посмотреть.
    И добавочно,на этой карте кисмет может не переводить карту в монитор сам,придетса вручную,потом запускать кисмет.
     
    #1599 vine, 29 Jan 2009
    Last edited: 29 Jan 2009
    1 person likes this.
  20. gold-goblin

    gold-goblin Elder - Старейшина

    Joined:
    26 Mar 2007
    Messages:
    917
    Likes Received:
    174
    Reputations:
    3
    мой kismet.conf В 1 тэг не влез
    Code:
    # Kismet config file
    # Most of the "static" configs have been moved to here -- the command line
    # config was getting way too crowded and cryptic.  We want functionality,
    # not continually reading --help!
    
    # Version of Kismet config
    version=2007.09.R1
    
    # Name of server (Purely for organizational purposes)
    servername=Kismet
    
    # User to setid to (should be your normal user)
    #suiduser=your_user_here
    
    # Do we try to put networkmanager to sleep?  If you use NM, this is probably
    # what you want to do, so that it will leave the interfaces alone while
    # Kismet is using them.  This requires DBus support!
    networkmanagersleep=true
    
    # Sources are defined as:
    # source=sourcetype,interface,name[,initialchannel]
    # Source types and required drivers are listed in the README under the
    # CAPTURE SOURCES section.
    # The initial channel is optional, if hopping is not enabled it can be used
    # to set the channel the interface listens on.
    # YOU MUST CHANGE THIS TO BE THE SOURCE YOU WANT TO USE
    source=iwl3945, wlan0,kismet
    
    # Comma-separated list of sources to enable.  This is only needed if you defined
    # multiple sources and only want to enable some of them.  By default, all defined
    # sources are enabled.
    # For example:
    # enablesources=prismsource,ciscosource
    
    
    # Automatically destroy VAPs on multi-vap interfaces (like madwifi-ng).
    # Madwifi-ng doesn't work in rfmon when non-rfmon VAPs are present, however
    # this is a fairly invasive change to the system so it CAN be disabled.  Expect
    # things not to work in most cases if you do disable it, however.
    vapdestroy=true
    
    
    # Do we channelhop?
    channelhop=true
    
    # How many channels per second do we hop?  (1-10)
    channelvelocity=5
    
    # By setting the dwell time for channel hopping we override the channelvelocity
    # setting above and dwell on each channel for the given number of seconds.
    #channeldwell=10
    
    # Do we split channels between cards on the same spectrum?  This means if 
    # multiple 802.11b capture sources are defined, they will be offset to cover
    # the most possible spectrum at a given time.  This also controls splitting
    # fine-tuned sourcechannels lines which cover multiple interfaces (see below)
    channelsplit=true
    
    # Basic channel hopping control:
    # These define the channels the cards hop through for various frequency ranges
    # supported by Kismet.   More finegrain control is available via the 
    # "sourcechannels" configuration option.
    # 
    # Don't change the IEEE80211<x> identifiers or channel hopping won't work.
    
    # Users outside the US might want to use this list:
    # defaultchannels=IEEE80211b:1,7,13,2,8,3,14,9,4,10,5,11,6,12
    defaultchannels=IEEE80211b:1,6,11,2,7,3,8,4,9,5,10
    
    # 802.11g uses the same channels as 802.11b...
    defaultchannels=IEEE80211g:1,6,11,2,7,3,8,4,9,5,10
    
    # 802.11a channels are non-overlapping so sequential is fine.  You may want to
    # adjust the list depending on the channels your card actually supports.
    # defaultchannels=IEEE80211a:36,40,44,48,52,56,60,64,100,104,108,112,116,120,124,128,132,136,140,149,153,157,161,184,188,192,196,200,204,208,212,216 
    defaultchannels=IEEE80211a:36,40,44,48,52,56,60,64
    
    # Combo cards like Atheros use both 'a' and 'b/g' channels.  Of course, you
    # can also explicitly override a given source.  You can use the script 
    # extras/listchan.pl to extract all the channels your card supports.
    defaultchannels=IEEE80211ab:1,6,11,2,7,3,8,4,9,5,10,36,40,44,48,52,56,60,64
    
    # Fine-tuning channel hopping control:
    # The sourcechannels option can be used to set the channel hopping for 
    # specific interfaces, and to control what interfaces share a list of 
    # channels for split hopping.  This can also be used to easily lock
    # one card on a single channel while hopping with other cards.
    # Any card without a sourcechannel definition will use the standard hopping
    # list.
    # sourcechannels=sourcename[,sourcename]:ch1,ch2,ch3,...chN
    
    # ie, for us channels on the source 'prism2source' (same as normal channel
    # hopping behavior):
    # sourcechannels=prism2source:1,6,11,2,7,3,8,4,9,5,10
    
    # Given two capture sources, "prism2a" and "prism2b", we want prism2a to stay
    
    
    
    # on channel 6 and prism2b to hop normally.  By not setting a sourcechannels 
    # line for prism2b, it will use the standard hopping.
    # sourcechannels=prism2a:6
    
    # To assign the same custom hop channel to multiple sources, or to split the 
    # same custom hop channel over two sources (if splitchannels is true), list
    # them all on the same sourcechannels line:
    # sourcechannels=prism2a,prism2b,prism2c:1,6,11
    
    # Port to serve GUI data
    tcpport=2501
    # People allowed to connect, comma seperated IP addresses or network/mask
    # blocks.  Netmasks can be expressed as dotted quad (/255.255.255.0) or as
    # numbers (/24)
    allowedhosts=127.0.0.1
    # Address to bind to.  Should be an address already configured already on
    # this host, reverts to INADDR_ANY if specified incorrectly.
    bindaddress=127.0.0.1
    # Maximum number of concurrent GUI's
    maxclients=5
    
    # Do we have a GPS?
    gps=false
    # Host:port that GPSD is running on.  This can be localhost OR remote!
    gpshost=localhost:2947
    # Do we lock the mode?  This overrides coordinates of lock "0", which will
    # generate some bad information until you get a GPS lock, but it will 
    # fix problems with GPS units with broken NMEA that report lock 0
    gpsmodelock=false
    
    # Packet filtering options:
    # filter_tracker - Packets filtered from the tracker are not processed or
    #                  recorded in any way.
    # filter_dump    - Packets filtered at the dump level are tracked, displayed,
    #                  and written to the csv/xml/network/etc files, but not 
    #                  recorded in the packet dump
    # filter_export  - Controls what packets influence the exported CSV, network,
    #                  xml, gps, etc files.
    # All filtering options take arguments containing the type of address and
    # addresses to be filtered.  Valid address types are 'ANY', 'BSSID',
    # 'SOURCE', and 'DEST'.  Filtering can be inverted by the use of '!' before
    # the address.  For example,
    # filter_tracker=ANY(!00:00:DE:AD:BE:EF)
    # has the same effect as the previous mac_filter config file option.
    # filter_tracker=...
    # filter_dump=...
    # filter_export=...
    
    # Alerts to be reported and the throttling rates.
    # alert=name,throttle/unit,burst/unit
    # The throttle/unit describes the number of alerts of this type that are
    # sent per time unit.  Valid time units are second, minute, hour, and day.
    # Burst rates control the number of packets sent at a time
    # For example:
    # alert=FOO,10/min,5/sec
    # Would allow 5 alerts per second, and 10 alerts total per minute.
    # A throttle rate of 0 disables throttling of the alert.
    # See the README for a list of alert types.
    alert=NETSTUMBLER,10/min,1/sec
    alert=WELLENREITER,10/min,1/sec
    alert=LUCENTTEST,10/min,1/sec
    alert=DEAUTHFLOOD,10/min,2/sec
    alert=BCASTDISCON,10/min,2/sec
    alert=CHANCHANGE,5/min,1/sec
    alert=AIRJACKSSID,5/min,1/sec
    alert=PROBENOJOIN,10/min,1/sec
    alert=DISASSOCTRAFFIC,10/min,1/sec
    alert=NULLPROBERESP,10/min,1/sec
    alert=BSSTIMESTAMP,10/min,1/sec
    alert=MSFBCOMSSID,10/min,1/sec
    alert=LONGSSID,10/min,1/sec
    alert=MSFDLINKRATE,10/min,1/sec
    alert=MSFNETGEARBEACON,10/min,1/sec
    alert=DISCONCODEINVALID,10/min,1/sec
    alert=DEAUTHCODEINVALID,10/min,1/sec
    
    # Known WEP keys to decrypt, bssid,hexkey.  This is only for networks where
    # the keys are already known, and it may impact throughput on slower hardware.
    # Multiple wepkey lines may be used for multiple BSSIDs.
    # wepkey=00:DE:AD:C0:DE:00,FEEDFACEDEADBEEF01020304050607080900
    
    # Is transmission of the keys to the client allowed?  This may be a security
    # risk for some.  If you disable this, you will not be able to query keys from
    # a client.
    allowkeytransmit=true
    
    # How often (in seconds) do we write all our data files (0 to disable)
    writeinterval=300
    
    # How old (and inactive) does a network need to be before we expire it?
    # This is really only good for limited ram environments where keeping a
    # total log of all networks is problematic.  This is in seconds, and should
    # be set to a large value like 12 or 24 hours.  This is intended for use
    # on stationary systems like an IDS
    # logexpiry=86400
    
    # Do we limit the number of networks we log?  This is for low-ram situations
    # when tracking everything could lead to the system falling down.  This
    # should be combined with a sane logexpiry value to flush out very old 
    # inactive networks.  This is mainly for stationary systems like an IDS.
    # limitnets=10000
    Code:
    # Do we track IVs?  this can help identify some attacks, but takes a LOT
    # of memory to do so on a busy network.  If you have the RAM, by all
    # means turn it on.
    trackivs=false
    
    # Do we use sound?
    # Not to be confused with GUI sound parameter, this controls wether or not the
    # server itself will play sound.  Primarily for headless or automated systems.
    sound=false
    # Path to sound player
    soundplay=/usr/bin/play
    # Optional parameters to pass to the player
    # soundopts=--volume=.3
    # New network found
    sound_new=//usr/share/kismet/wav/new_network.wav
    # Wepped new network
    # sound_new_wep=${prefix}/com/kismet/wav/new_wep_network.wav
    # Network traffic sound
    sound_traffic=//usr/share/kismet/wav/traffic.wav
    # Network junk traffic found
    sound_junktraffic=//usr/share/kismet/wav/junk_traffic.wav
    # GPS lock aquired sound
    # sound_gpslock=//usr/share/kismet/wav/foo.wav
    # GPS lock lost sound
    # sound_gpslost=//usr/share/kismet/wav/bar.wav
    # Alert sound
    sound_alert=//usr/share/kismet/wav/alert.wav
    
    # Does the server have speech? (Again, not to be confused with the GUI's speech)
    speech=false
    # Server's path to Festival
    festival=/usr/bin/festival
    # Are we using festival lite?  If so, set the above "festival" path to also
    # point to the "flite" binary
    flite=false
    # Are we using Darwin speech? 
    darwinsay=false
    # What voice do we use?  (Currently only valid on Darwin)
    speech_voice=default
    # How do we speak?  Valid options:
    # speech    Normal speech
    # nato      NATO spellings (alpha, bravo, charlie)
    # spell     Spell the letters out (aye, bee, sea)
    speech_type=nato
    # speech_encrypted and speech_unencrypted - Speech templates
    # Similar to the logtemplate option, this lets you customize the speech output.
    # speech_encrypted is used for an encrypted network spoken string
    # speech_unencrypted is used for an unencrypted network spoken string
    #
    # %b is replaced by the BSSID (MAC) of the network
    # %s is replaced by the SSID (name) of the network
    # %c is replaced by the CHANNEL of the network
    # %r is replaced by the MAX RATE of the network
    speech_encrypted=New network detected, s.s.i.d. %s, channel %c, network encrypted.
    speech_unencrypted=New network detected, s.s.i.d. %s, channel %c, network open.
    
    # Where do we get our manufacturer fingerprints from?  Assumed to be in the
    # default config directory if an absolute path is not given.
    ap_manuf=ap_manuf
    client_manuf=client_manuf
    
    # Use metric measurements in the output?
    metric=false
    
    # Do we write waypoints for gpsdrive to load?  Note:  This is NOT related to
    # recent versions of GPSDrive's native support of Kismet.
    waypoints=false
    # GPSDrive waypoint file.  This WILL be truncated.
    waypointdata=%h/.gpsdrive/way_kismet.txt
    # Do we want ESSID or BSSID as the waypoint name ?
    waypoint_essid=false
    
    # How many alerts do we backlog for new clients?  Only change this if you have
    # a -very- low memory system and need those extra bytes, or if you have a high
    # memory system and a huge number of alert conditions.
    alertbacklog=50
    
    # File types to log, comma seperated
    # dump    - raw packet dump
    # network - plaintext detected networks
    # csv     - plaintext detected networks in CSV format
    # xml     - XML formatted network and cisco log
    # weak    - weak packets (in airsnort format)
    # cisco   - cisco equipment CDP broadcasts
    # gps     - gps coordinates
    logtypes=dump,network,csv,xml,weak,cisco,gps
    
    # Do we track probe responses and merge probe networks into their owners?
    # This isn't always desireable, depending on the type of monitoring you're
    # trying to do.
    trackprobenets=true
    
    # Do we log "noise" packets that we can't decipher?  I tend to not, since 
    # they don't have anything interesting at all in them.
    noiselog=false
    
    # Do we log corrupt packets?  Corrupt packets have enough header information
    # to see what they are, but someting is wrong with them that prevents us from
    # completely dissecting them.  Logging these is usually not a bad idea.
    corruptlog=true
    
    # Do we log beacon packets or do we filter them out of the dumpfile
    beaconlog=true
    
    # Do we log PHY layer packets or do we filter them out of the dumpfile
    phylog=true
    
    # Do we mangle packets if we can decrypt them or if they're fuzzy-detected
    mangledatalog=true
    
    # Do we do "fuzzy" crypt detection?  (byte-based detection instead of 802.11
    # frame headers)
    # valid option: Comma seperated list of card types to perform fuzzy detection 
    #  on, or 'all'
    fuzzycrypt=wtapfile,wlanng,wlanng_legacy,wlanng_avs,hostap,wlanng_wext,ipw2200,ipw2915
    
    # Do we do forgiving fuzzy packet decoding?  This lets us handle borked drivers
    # which don't indicate they're including FCS, and then do.
    fuzzydecode=wtapfile,radiotap_bsd_a,radiotap_bsd_g,radiotap_bsd_bg,radiotap_bsd_b,pcapfile
    
    # Do we use network-classifier fuzzy-crypt detection?  This means we expect 
    # packets that are associated with an encrypted network to be encrypted too, 
    # and we process them by the same fuzzy compare. 
    # This essentially replaces the fuzzycrypt per-source option.
    netfuzzycrypt=true
    
    # What type of dump do we generate? 
    # valid option: "wiretap" 
    dumptype=wiretap
    # Do we limit the size of dump logs?  Sometimes ethereal can't handle big ones.
    # 0 = No limit
    # Anything else = Max number of packets to log to a single file before closing
    # and opening a new one.
    dumplimit=0
    
    # Do we write data packets to a FIFO for an external data-IDS (such as Snort)?
    # See the docs before enabling this.
    #fifo=/tmp/kismet_dump
    
    # Default log title
    logdefault=Kismet
    
    # logtemplate - Filename logging template.
    # This is, at first glance, really nasty and ugly, but you'll hardly ever
    # have to touch it so don't complain too much.
    #
    # %n is replaced by the logging instance name
    # %d is replaced by the current date as Mon-DD-YYYY
    # %D is replaced by the current date as YYYYMMDD
    # %t is replaced by the starting log time
    # %i is replaced by the increment log in the case of multiple logs
    # %l is replaced by the log type (dump, status, crypt, etc)
    # %h is replaced by the home directory
    # ie, "netlogs/%n-%d-%i.dump" called with a logging name of "Pok" could expand
    # to something like "netlogs/Pok-Dec-20-01-1.dump" for the first instance and 
    # "netlogs/Pok-Dec-20-01-2.%l" for the second logfile generated.
    # %h/netlots/%n-%d-%i.dump could expand to
    # /home/foo/netlogs/Pok-Dec-20-01-2.dump
    #
    # Other possibilities:  Sorting by directory
    # logtemplate=%l/%n-%d-%i
    # Would expand to, for example,
    # dump/Pok-Dec-20-01-1
    # crypt/Pok-Dec-20-01-1
    # and so on.  The "dump", "crypt", etc, dirs must exist before kismet is run
    # in this case.
    logtemplate=/var/log/kismet/%n-%d-%i.%l
    
    # Where do we store the pid file of the server?
    piddir=/var/run/
    
    # Where state info, etc, is stored.  You shouldnt ever need to change this.
    # This is a directory.
    configdir=/var/lib/kismet/
    
    # cloaked SSID file.  You shouldn't ever need to change this.
    ssidmap=ssid_map
    
    # Group map file.  You shouldn't ever need to change this.
    groupmap=group_map
    
    # IP range map file.  You shouldn't ever need to change this.
    ipmap=ip_map
     
    #1600 gold-goblin, 29 Jan 2009
    Last edited: 29 Jan 2009
Thread Status:
Not open for further replies.