Thanks to the new data format Kismet uses, it's possible to add additional complex fields to network records, trivially. One of the fields we can add: WPA packets!
This lets Kismet collect WPA handshakes and provide them as pcap files directly over the web ui.
Let's look for a network with captured handshakes
Kismet will highlight networks with a complete WPA handshake (or what appears to be a complete handshake) automatically.
For fun, you can also change the color of the highlighted network in the settings...
Look at the network details
The network details will show the handshake and offer a PCAP download if there is a complete handshake. To be crackable, the handshake needs at least packets 1 and 2 or 2 and 3, and preferably all four packets of the handshake. If you have insufficient packets, Kismet will warn you:
Internally this is stored as a bitset (where packet sequences 1, 2, 3, and 4 are bits 0, 1, 2, and 3 respectively) so scripts can easily check to see which handshake components a network has; rest_examples/scan_for_wpa_handshake.py shows a quick use of this:
if ((d['dot11.device.wpa_present_handshake'] & 0x06) == 0x06 or
(d['dot11.device.wpa_present_handshake'] & 0x0C) == 0x0C):
pkts = 
for i in range(1, 5):
if d['dot11.device.wpa_present_handshake'] & i:
Download the pcap
Download the pcap file. You'll be prompted for your username and password you configured in kismet_httpd.conf - you did change the default password, right?
Take a look in Wireshark
You can open the pcap in Wireshark to take a look - you'll see that Kismet saves the handshake packets only, making a very small pcap file. This is similar to trimming a much larger pcap file, only the packets required by Aircrack (or similar tools) are included.
Or whatever tool you like; for Aircrack the syntax would be:
aircrack-ng -w wordlist -e UESC-N -b 0E-18-D6-9D-0D-AC 0E-18-D6-9D-0D-AC-handshake.pcap
Note that we provide the wordlist (-w), the ESSID (-e), and the BSSID (-b), and the PCAP we downloaded from Kismet. You need all these parameters for Aircrack to detect the handshakes properly from the PCAP Kismet generates.
Let the magic happen
Obviously this (also obviously doctored) screenshot took no time because we populated the wordlist with only one entry: The known PSK for this network.
Where to get it
This is in the Kismet git-master code, located at https://www.kismetwireless.net/kismet.git or at the Github mirror at https://www.github.com/kismetwireless/kismet.git if you want to live on the edge, and it will show up in the next major Kismet release including the web-ui and all the other new code.