

With the updating of Kismet to -ng, Kismet now supports a wide variety of scanning plugins including DECT, Bluetooth, and others. The client communicates with the server and displays the information the server collects.

A server can either be used in conjunction with a drone, or on its own, interpreting packet data, and extrapolating wireless information, and organizing it. A drone can be used to collect packets, and then pass them on to a server for interpretation. Kismet also supports logging of the geographical coordinates of the network if the input from a GPS receiver is additionally available. The advantage with this method is that it will capture more packets because adjacent channels overlap. This means that it constantly changes from channel to channel non-sequentially, in a user-defined sequence with a default value that leaves big holes between channels (for example, 1-6-11-2-7-12-3-8-13-4-9-14-5-10). In order to find as many networks as possible, Kismet supports channel hopping. Kismet also features the ability to detect default or "not configured" networks, probe requests, and determine what level of wireless encryption is used on a given access point. Kismet can also capture "Per-Packet Information" headers. Kismet features the ability to log all sniffed packets and save them in a tcpdump/ Wireshark or Airsnort compatible file format. Kismet also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks. An explanation of the headings displayed in Kismet.
