Kismet is a wireless sniffer (and intrusion detection system) which is widely used to sniff Wireless LAN (e.g 802.11b, 802.11a, and 802.11g traffic). Kismet Client/Server protocol is used by Kismet Client (GUI) and Kismet server. It is used to control server, and it's capture sources.
Annother protocol ([Kismet Drone/Server Protocol](/Kismet-Drone/Server-Protocol)) is used by Kismet Server for communication with Kismet's remote drones.
## History
XXX - add a brief description of PROTO history
## Protocol dependencies
-[TCP](/TCP): Kismet Client/Server uses [TCP](/TCP) as its transport protocol. The default port TCP port for Kismet C/S traffic is 2501.
A complete list of Kismet C/S display filter fields can be found in the [display filter reference](http://www.wireshark.org/docs/dfref/protofirstletter/proto.html)
Show only the Kismet C/S based traffic:
```
kismet
```
## Capture Filter
You cannot directly filter Kismet C/S protocols while capturing. However, if you know the [TCP](/TCP) port used (see above), you can filter on that one.
Capture only the Kismet C/S traffic over the default port (2501):
```
tcp port 2501
```
## External links
-[Kismet Homepage](http://www.kismetwireless.net) - Official Kismet Project Site
-[Kismet protocol dissector for Ethereal](http://www.burghardt.pl/wiki/software/kismet_protocol_dissector_for_ethereal) - Krzysztof Burghardt's Kismet C/S dissector
-[Kismet Client/Server Protocol](http://wiki.ethereal.com/Kismet_Client/Server_Protocol) - The Ethereal Wiki
## Discussion
---
Imported from https://wiki.wireshark.org/Kismet_Client/Server_Protocol on 2020-07-31 01:13:32 UTC