# Additional Information

## <mark style="color:blue;">WIFI WarDriving</mark>

### <mark style="color:blue;">What Is Wardriving?</mark>

Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet. Warbiking, warcycling, warwalking and similar use the same approach but with other modes of transportation.

Wardrivers use a Wi-Fi-equipped device together with a GPS device to record the location of wireless networks. The results can then be uploaded to websites like WiGLE where the data is processed to form maps of the network neighborhood. There are also clients available for smartphones running Android that can upload data directly. For better range and sensitivity, antennas are built or bought, and vary from omnidirectional to highly directional.

Wardriving can be used for both legitimate and malicious purposes. Legitimate uses of wardriving include:

* Mapping the availability of Wi-Fi networks in a given area.
* Identifying and troubleshooting problems with Wi-Fi networks.
* Finding free Wi-Fi networks to use while traveling.

Malicious uses of wardriving include:

* Gaining unauthorized access to Wi-Fi networks.
* Stealing data from devices connected to Wi-Fi networks.
* Launching attacks against devices connected to Wi-Fi networks.

{% embed url="<https://www.fortinet.com/resources/cyberglossary/wardriving>" %}

{% embed url="<https://wardriver.uk/software_3>" %}

### <mark style="color:blue;">WIGLE Mapp</mark>

{% embed url="<https://wigle.net>" %}

### <mark style="color:blue;">WIGLE WarDriving APP</mark>

{% embed url="<https://play.google.com/store/apps/details?id=net.wigle.wigleandroid&hl=en&gl=US&pli=1>" %}

### <mark style="color:blue;">WIFI WarDriving Tool</mark>

#### <mark style="color:blue;">Assembled WarDriver</mark>

<figure><img src="https://463n7.io/wp-content/uploads/2023/08/PXL_20230812_191918243-scaled.jpg" alt="" width="375"><figcaption></figcaption></figure>

{% embed url="<https://463n7.io/product/assembled-wardriver/>" %}

#### <mark style="color:blue;">DIY Assembled WarDriver</mark>

To learn about the process of Building a DIY Assembled WarDriver you can watch[ this YouTube video](https://www.youtube.com/watch?v=snlNfVZJ6Xw) created by [463n7](https://www.youtube.com/@463n7).

## <mark style="color:blue;">Other Prebuild WIFI Pentesting Tools(Hardware)</mark>

### <mark style="color:blue;">ESP32 Marauder (Project by JustCallMeKoko)</mark>

<figure><img src="https://cdn.tindiemedia.com/images/resize/JvnHl7gW3a-B5yH9n-NbUf_RwZ4=/p/fit-in/1370x912/filters:fill(fff)/i/663561/products/2023-03-15T15%3A52%3A27.573Z-IMG_7187%20-%20Copy.jpg?1678870360" alt="" width="375"><figcaption></figcaption></figure>

ESP32 Marauder is a Wi-Fi deauther project created by the hacker and maker "justcallmekoko" using the ESP32 microcontroller. The ESP32 Marauder is designed to detect and disrupt Wi-Fi networks by sending deauthentication (deauth) packets to targeted devices, forcing them to disconnect from their networks.

The ESP32 Marauder can be used for various purposes, such as security testing, network monitoring, or learning about Wi-Fi deauthentication attacks. It comes with a built-in OLED display and a web interface for configuration and control. The device can be powered using a USB cable or battery, making it portable and easy to use in different environments.

As with any security tool, it is important to use the ESP32 Marauder responsibly and with the appropriate authorization and legal permission.

{% embed url="<https://github.com/justcallmekoko/ESP32Marauder>" %}

Buy Your ESP32 Marauder:

{% embed url="<https://www.tindie.com/products/justcallmekoko/esp32-marauder-mini/>" %}

{% embed url="<https://www.tindie.com/products/justcallmekoko/esp32-marauder-v6/>" %}

To learn about the process of Building a DIY ESP32 Marauder you can watch [this YouTube video](https://www.youtube.com/watch?v=BGFO1wA29o8) created by [Just Call Me Koko](https://www.youtube.com/@JustCallMeKoko).

### <mark style="color:blue;">ESP8266 WIFI Captive Portal</mark>

{% embed url="<https://github.com/adamff1/ESP8266_WiFi_Captive_Portal_2.0>" %}

### <mark style="color:blue;">ESP8266 Router Honeypot</mark>

{% embed url="<https://github.com/skickar/ESP8266_Router_Honeypot>" %}

### <mark style="color:blue;">ESP BUG</mark>

To learn about ESP BUG you can watch [this YouTube video](https://www.youtube.com/watch?v=noC0cVn4NCM) created by [SecurityFWD](https://www.youtube.com/@SecurityFWD).

#### <mark style="color:blue;">AlexLynd ESP-Bug</mark>

{% embed url="<https://github.com/AlexLynd/ESP-Bug>" %}

To learn about the process of Building a DIY AlexLynd ESP-Bug you can watch [this YouTube video ](https://www.youtube.com/watch?v=1uSg9JoDGeU)created by [Hak5](https://www.youtube.com/@hak5).

#### <mark style="color:blue;">willmendil ESPBug</mark>

{% embed url="<https://github.com/willmendil/ESPBug>" %}

To learn about the process of Building a DIY willmendil ESPBug you can watch [this YouTube video](https://www.youtube.com/watch?v=X95rtPqSzw4) created by [MyLittleRobot](https://www.youtube.com/@mylittlerobot2965).

### <mark style="color:blue;">Build your own DIY WIFI Pineapple</mark>

* TP-Link TL-MR3020:

{% embed url="<https://wiki.khairulazam.net/index.php?title=Wifi_Pineapple_Mark_V_on_TP-Link_MR3020>" %}

* GL AR-150 / GL-AR750S:

{% embed url="<https://linuxoperator.com/guides/ar150/>" %}

{% embed url="<https://github.com/xchwarze/AR150-WiFiPineapple>" %}

{% embed url="<https://github.com/xchwarze/wifi-pineapple-cloner>" %}

* Buffalo WZR-HP-G450H or Buffalo WZR-HP AG300H or TP-Link Archer C7 v4:

{% embed url="<https://samy.link/blog/build-your-own-wifi-pineapple-tetra-for-7>" %}

* Other hardware:&#x20;

{% embed url="<https://gitlab.com/0xSamy/sweet-pineapple-builder>" %}

## <mark style="color:blue;">Other WIFI Pentesting Tools(Software)</mark>

### [<mark style="color:blue;">WiFi Pumpkin</mark>](https://github.com/P0cL4bs/WiFi-Pumpkin-deprecated)

{% embed url="<https://github.com/P0cL4bs/WiFi-Pumpkin-deprecated>" %}

### <mark style="color:blue;">Airbase-ng</mark>

{% embed url="<https://www.aircrack-ng.org/doku.php?id=airbase-ng>" %}

### <mark style="color:blue;">Lazy Script</mark>

{% embed url="<https://github.com/arismelachroinos/lscript>" %}

{% embed url="<https://null-byte.wonderhowto.com/how-to/hack-wi-fi-networks-more-easily-with-lazy-script-0185764/>" %}

### <mark style="color:blue;">Fluxion Tool</mark>

{% embed url="<https://github.com/FluxionNetwork/fluxion>" %}

{% embed url="<https://en.kali.tools/?p=235>" %}

### <mark style="color:blue;">kismet</mark>

{% embed url="<https://www.kismetwireless.net>" %}

{% embed url="<https://www.kismetwireless.net/docs/readme/intro/kismet/>" %}

### <mark style="color:blue;">DNS Chef</mark>

{% embed url="<https://www.kali.org/tools/dnschef/>" %}

{% embed url="<https://gitlab.com/kalilinux/packages/dnschef>" %}

{% embed url="<https://github.com/iphelix/dnschef>" %}

### Ettercap

{% embed url="<https://www.ettercap-project.org>" %}
