KisMAC – What Is It?

KisMAC is a good discovery tool for a wireless network. It has many good features of its own as well as similar to others like Wellenreiter. It’s a free, open source wireless stumbling and security tool specifically for Mac OS X. It has ability to scan for both networks passively and actively. Many different kind of cards are supported for passive network scanning which includes Apple’s AirPort, AirPort Extreme and many other third-party cards. For actively network scanning ability, any card that your Mac OS X is supported, you are good to go.

Moreover, WEP and WPA keys cracking is another ability and feature of KisMAC. It uses brute force method and exploiting flaws. When your MAC OS supports monitor mode, you will be able to perform weak scheduling and badly generate keys. Also, if you have Prism2 or Ralink card, you can do packet reinjection. Similarly to Wellenreiter, GPS capability is there which can be mapped when GPS receiver is attached and compatible with National Marine Electronics Association (NMEA).

As describe above, those features and abilities are on the old version of KisMAC. You are now have chance to play with its new version called KisMac2. It has new GUI and features which can be run on OS X 10.7 to 10.10 with 64-bit only. 🙁 Sad with that limitation, right? I know the latest version of OS X now is 10.11, you can not get something if you do not do something. You may have an old Mac that run old version of OS X, or if you want to get result by using this tool, you have to do something. You can save data with pcap extension then you can open it with Wireshark.

Here are the summarized features in point format:

  • Kismet drone support (capture from a Kismet drone)
  • AppleScript-able
  • Deauthentication attacks
  • Different attacks against encrypted networks
  • Support for 802.11b/g
  • Reveals hidden / cloaked / closed SSIDs
  • PCAP import and export
  • Can draw area maps of network coverage
  • Mapping and GPS support
  • Shows logged in clients (with MAC Addresses, IP addresses and signal strengths)


Screen Shot 2016-07-03 at 00.01.37 Screen Shot 2016-07-03 at 00.01.06


The project has now been move to GitHub for KisMac2 since 2011 by Michael Rossberg and Geoffrey Kruse. Before that, it was led and created by Geoffrey Kruse until July 27, 2007. When German law prohibits the production and distribution of security software, Geoffrey Kruse has removed himself from the project and passed it to Geoffrey Kruse.

Where can I get the tool?

In order to test and play with it, you can download its latest version of KisMac2 via below bottom.

[button color=”blue” size=”medium” link=”″ icon=”” target=”true”]Download KisMac2[/button]

Not enough yet?

Check out HERE for more information about KisMac2.

[button color=”gray” size=”medium” link=”″ icon=”” target=”true”]More Information About KisMac2[/button]

Leave a Reply

Your email address will not be published. Required fields are marked *