*Note this script requires
requests  and a wireless interface that supports monitor and promiscuous mode.
: http://www.python-requests.org/en/latest/ “Python Requests”
How to use:
$ cd /path/to/hubbIT-sniffer
First you need to setup the required interface. Fortunately there is script provided that will do just that:
After that you only need to start the hubbit-sniffer (you need to be a member of the wireshark group in order to be able to run the sniffer without being root):
$ screen -S hubbit-sniffer -U $ python3 sniffer/sniffer.py -a api_key_goes_here -b sniffer/blacklist.txt
If you need more customisability, have a look at
python3 sniffer/sniffer.py --help
The blacklist is a
\n separated text file of mac addresses to ignore. This is best used together with the script
nearby-aps.sh in order to ignore any traffic coming from nearby access points.
# scripts/nearby-aps.sh > sniffer/blacklist.txt
-t flag you can adjust how often the sniffer sends batch updates to the server. Default is 5 seconds.