Why should I use KisMAC instead of something else?
• Passive Stumbling (now on AirPort and AirPort Extreme cards as of r148) – you can find hidden networks, tunnels, and see probe requests. • WEP and WPA cracking features – test out the security of (your own) wireless networks. • Huge vendor.db that can identify the vendor of EVERY access point out there whose creator is registered with the IEEE. • MacStumbler and iStumbler only support active stumbling on AirPort cards. We support many third-party cards as well. • MacStumbler has GPS integration (it records the GPS coordinates that the network was last seen as), and iStumbler has it in pre-alpha (i.e. it doesn’t work). We have fully working GPS support and moving-map display. MacStumbler can only give you a list of coordinates. • Area mapping – plot the regions of high and low signal strength on a map. • It’s free and open source. Netstumbler, which is not even in active development any more, requires payment for commercial usage.
• Passive Sniffing (including AirPort and AirPort Extreme cards as of r148) – you can find hidden networks, tunnels, and see probe requests. • WEP and WPA cracking features – test out the security of (your own) wireless networks. • Huge vendor.db database that can identify the vendor of EVERY access point out there whose creator is registered with the IEEE. • MacStumbler and iStumbler only support active stumbling on AirPort cards. We support many third-party cards as well. • MacStumbler has GPS integration (it records the GPS coordinates that the network was last seen as), and iStumbler has it in pre-alpha (i.e. it doesn’t work). We have fully working GPS support and moving-map display. MacStumbler can only give you a list of coordinates. • Area mapping – plot the regions of high and low signal strength on a map. • It’s free and open source. Netstumbler, which is not even in active development any more, requires payment for commercial usage.