Kismet vs. NetworkMiner

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Kismet
Score 0.0 out of 10
N/A
Kismet is a wireless network and device detector, sniffer, wardriving tool, and WIDS (wireless intrusion detection) framework. Kismet works with Wi-Fi interfaces, Bluetooth interfaces, some SDR (software defined radio) hardware like the RTLSDR, and other specialized capture hardware. Kismet works on Linux, OSX, and, to a degree, Windows 10 under the WSL framework. On Linux it works with most Wi-Fi cards, Bluetooth interfaces, and other hardware devices. On OSX it works with the built-in Wi-Fi…N/A
NetworkMiner
Score 8.0 out of 10
N/A
NetworkMiner is an open source Network Forensic Analysis Tool (NFAT) for Windows. It is developed and supported by Netresec, a small company headquartered in Sweden.N/A
Pricing
KismetNetworkMiner
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
KismetNetworkMiner
Free Trial
NoNo
Free/Freemium Version
YesNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Best Alternatives
KismetNetworkMiner
Small Businesses
Auvik
Auvik
Score 8.5 out of 10

No answers on this topic

Medium-sized Companies
SolarWinds NetFlow Traffic Analyzer (NTA)
SolarWinds NetFlow Traffic Analyzer (NTA)
Score 9.4 out of 10
PRTG
PRTG
Score 8.5 out of 10
Enterprises
SolarWinds NetFlow Traffic Analyzer (NTA)
SolarWinds NetFlow Traffic Analyzer (NTA)
Score 9.4 out of 10
PRTG
PRTG
Score 8.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
KismetNetworkMiner
Likelihood to Recommend
-
(0 ratings)
8.0
(1 ratings)
User Testimonials
KismetNetworkMiner
Likelihood to Recommend
Open Source
No answers on this topic
Open Source
The NetworkMiner software in my view is a software recommended for small and/or large companies, it may be less useful in small companies or offices, but it can also be used for simple analysis. In medium and large scenarios, it is very useful in analyzing network traffic and identifying possible security flaws, password exposures and weaknesses in the security of solutions and/or technologies used in the internal network.
Read full review
Pros
Open Source
No answers on this topic
Open Source
  • Credential capture exclusive tab
  • Graphical interface for data analysis
  • Exclusive intuitive host connection listing tab
Read full review
Cons
Open Source
No answers on this topic
Open Source
  • MAC listing of hosts in listed connections
  • Possibility to start capture focusing on only a specific host
Read full review
Return on Investment
Open Source
No answers on this topic
Open Source
  • Increase in the possibility of identifying security flaws in trafficked data
  • Monitor network traffic easily with no financial investment
Read full review
ScreenShots