giskismet
wireless recon visualization tool for Kismet data
TLDR
Import Kismet NETXML data
$ giskismet -x [kismet-output.netxml]
Query for specific access points by ESSID$ giskismet -q "select * from wireless where ESSID='[MyNetwork]'"
Export results to KML file$ giskismet -x [data.netxml] -o [output.kml]
Filter by encryption type$ giskismet -x [data.netxml] --encryption [WPA]
Filter by BSSID$ giskismet -x [data.netxml] --bssid [AA:BB:CC:DD:EE:FF]
SYNOPSIS
giskismet [options]
DESCRIPTION
giskismet is a Perl-based tool that processes wireless recon data gathered by Kismet and stores it in a SQLite database. Users can run SQL queries against the data and generate Google Earth KML files for mapping access point locations.The tool supports filtering by BSSID, ESSID, encryption type, and channel, making it useful for wireless security assessments and site surveys.
PARAMETERS
-h, --help
Display help.-v, --version
Display version.-x FILE, --xml FILE
Parse Kismet NETXML file.--csv FILE
Parse Kismet CSV file.--bssid FILTER
Filter by BSSID (file or comma-separated list).--essid FILTER
Filter by ESSID (file or comma-separated list).--encryption FILTER
Filter by encryption type (file or comma-separated list).--channel FILTER
Filter by channel (file or comma-separated list).-a, --ap
Insert only access points.-q SQL, --query SQL
Execute SQL query against the database.-o FILE, --output FILE
Specify output filename for KML export.-n NAME, --name NAME
Set KML layer name.-s, --silent
Suppress output when adding access points.-d LEVEL, --debug LEVEL
Debug information level.
CAVEATS
Requires Kismet NETXML output files as input. GPS data must be present in the Kismet capture for meaningful KML output. The tool is deprecated in favor of newer Kismet built-in visualization features.
SEE ALSO
kismet(1), aircrack-ng(1)
