KisMAC 0.3.3

I have un-installed the Realtek drivers and installed Kismac 0.3.3 + the R407 trunk. The device does not seem to be working:-When I open Kismac and plug in my 036H, I scan for networks and nothing appears.-The light on the Alfa device has also not lit up.-Also, in System Preferences Network the device does not appear. KisMAC 0.3.4 for Mac can be downloaded from our website for free. The application can also be called 'KisMAC trunk r319', 'KisMAC trunk r278', 'KisMAC trunk r296'. Kismac-0.3.3.dmg is the common file name to indicate the KisMAC installer. The most popular version among the application users is 0.3. 7/10 (5 Stimmen) - Download KisMAC kostenlos. Finden Sie keine drahtlose Netzwerke? Downloaden Sie KisMAC, suchen Sie Netzverbindungen in Ihrer Umgebung und analysieren Sie seine Sicherheitsdaten. KisMAC 0.3.3 (External server) KisMAC 0.3.3 (Producer Mirror) Popular Downloads. Mozilla Firefox 84.0. Firefox is a fast, full-featured Web browser. Outlook Express 5.0.6 Microsoft Outlook Express is an email client; Minecraft 1.8.1 Build anything you can imagine.

Stable release
0.3.4 (Alpha 4) / September 2015; 5 years ago[1]
Operating systemMac OS X
TypeWi-Fi tool
Website (Kismac2) (Kismac original)

Leaf on the wind llc. KisMAC is a wireless network discovery tool for Mac OS X. It has a wide range of features, similar to those of Kismet (its Linux/BSD namesake). The program is geared toward network security professionals, and is not as novice-friendly as similar applications. Distributed under the GNU General Public License,[2] KisMAC is free software.

KisMAC will scan for networks passively on supported cards - including Apple's AirPort, and AirPort Extreme, and many third-party cards, and actively on any card supported by Mac OS X itself.

Cracking of WEP and WPA keys, both by brute force, and exploiting flaws such as weak scheduling and badly generated keys is supported when a card capable of monitor mode is used, and packet reinjection can be done with a supported card (Prism2 and some Ralink cards). GPS mapping can be performed when an NMEA compatible GPS receiver is attached.[3]


Kismac2 is a fork of the original software with a new GUI, new features and that works for OS X 10.7 - 10.10, 64-bit only. It is no longer maintained.

Data can also be saved in pcap format and loaded into programs such as Wireshark.

KisMAC Features[edit]

  • Reveals hidden / cloaked / closed SSIDs
  • Shows logged in clients (with MAC Addresses, IP addresses and signal strengths)
  • Mapping and GPS support
  • Can draw area maps of network coverage
  • PCAP import and export
  • Support for 802.11b/g
  • Different attacks against encrypted networks
  • Deauthentication attacks
  • AppleScript-able
  • Kismet drone support (capture from a Kismet drone)

KisMAC and Germany[edit]

The project was created and led by Michael Rossberg until July 27, 2007, when he removed himself from the project due to changes in German law (specifically, StGB Section 202c) that 'prohibits the production and distribution of security software'.[4] On this date, project lead was passed on to Geoffrey Kruse, maintainer of KisMAC since 2003, andactive developer since 2001. KisMAC is no longer being actively being developed.[citation needed] Primary development, and the relocated KisMAC web site were offline as of September 2016. As of August 6, 2007, the former homepage now denounces the new German law.

KisMac2 was project to continue development but is no longer maintained as well.

See also[edit]


  1. ^KisMAC2 0.3.4 Changes
  2. ^'Under What License is KisMAC Published?'. Archived from the original on 2008-03-03. Retrieved 2008-02-22.CS1 maint: discouraged parameter (link)
  3. ^'gpsd — a GPS service daemon'. Archived from GPSd the original Check url= value (help) on 2008-02-12. Retrieved 2008-02-22.CS1 maint: discouraged parameter (link)
  4. ^'Germany says goodbye KisMAC!'. Retrieved 2008-02-22.CS1 maint: discouraged parameter (link)

External links[edit]

Retrieved from ''

Kismac 0.3 3 Dmg

Cracking WEP Networks with KisMAC+aircrack-ng on Mac OS X Lion

UPDATE 12-5-12: Thanks to a reader (see comments below), I've gotten my hands on a version of KisMAC that works on Mac OS X Mountain Lion! While it may be a beta version, it does at least run and collect unique IVs from my Airport Extreme card, and I'm able to use the data in aircrack-ng. Download it here:

Your situation: You've spent endless hours researching/experimenting with cracking your own personal WEP encrypted wireless network and you just can't seem to get it accomplished. You don't necessarily have state-of-the-art equipment (other than your super fine Macbook/Macbook Pro), and you can't run other alternatives such as Backtrack 5. You're stuck with KisMAC although it's outdated software. It just so happens you're still in luck. All you need are a couple extra tools and some tips that aren't usually discussed anywhere else.
What you need:
  • KisMAC - the latest version is currently 0.3.3
  • MacPorts - I downloaded the disk image for Lion
Go ahead and install KisMAC and MacPorts (standard installation with defaults is fine). You may need to see the MacPorts installation instructions if you don't already have Apple's developer tools installed. Once MacPorts is installed, you can install the last piece of the puzzle (and most important): aircrack-ng. Just run this command in terminal:
sudo port install aircrack-ng
If you get an error, you may need to update your MacPorts sources:
sudo port selfupdate
Once aircrack-ng is installed, you're ready to go. You should already be familiar with basic KisMAC usage, so if you're not, refer to some beginner tutorials on it first. This guide is targeted at some of the 'gotchas' of using KisMAC and aircrack-ng. To briefly get KisMAC set up:
  1. Open KisMAC
  2. Go to Preferences -> Driver
  3. Add your first card (mine was the Airport Extreme passive mode)
  4. Select the channel the target AP is on (if you don't already know this, refer to beginner docs
  5. If the card is used for injection, select the 'use as primary device' option
  6. Select 'Keep everything' in the Dump Filter settings and select a location to save the dump files
  7. Add your second card and repeat steps 4-6
KismacI recommend that you keep dump files from both cards stored in the same folder (an empty folder somewhere).

Kismac 0.3.3

Now it's time to start sniffing. Click 'Start Scan' and watch as data starts coming in. Double click on the target AP in the list and click Network -> Reinject Packets to start packet reinjection and quickly generate unique IVs. You should see the Unique IV count climb.
The last step is to start aircrack-ng. Open Terminal and type:
aircrack-ng -b
I selected the ~/Desktop/aircrack/ folder to store my KisMAC dumps, so my example would be something like:
aircrack-ng -b 00:00:00:00:00:00 ~/Desktop/aircrack/*
Of course you need to enter the bssid of the target AP after the -b flag. Aircrack-ng should load up any dump files in that directory and start cracking. It will automatically attempt to crack every 5000 IVs, so you don't have to even worry about rerunning it.
Now for the tips that it took me hours to discover:
  1. aircrack-ng can use multiple dump files, so you can stop/start KisMAC all you want and create multiple files. Just use the asterisk like I did in my aircrack-ng example above. You could even do something like ~/Desktop/Dump* to get all the files that begin with 'Dump'.
  2. If you encounter errors in aircrack-ng about a corrupt file or incorrect packet length, the problem is that KisMAC is dumping management and control packets too. We really only need data packets, so you can go back in the Preferences -> Driver section and instead of selecting 'Keep Everything', you can select 'Data Only'. This should correct the errors.
  3. If you notice that the number of IVs in KisMAC is drastically greater than those showing in aircrack-ng, do tip 2 above. If that doesn't fix it, make sure you are saving dumps from all of your devices.

Kismac 0.3.3 Download

Once I figured that out, I was able to crack my network in under 5 minutes with only 15,000 unique IVs.
Happy cracking and remember to only experiment on network you own or have permission to crack.