Additional Information

WIFI WarDriving

What Is Wardriving?

Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet. Warbiking, warcycling, warwalking and similar use the same approach but with other modes of transportation.

Wardrivers use a Wi-Fi-equipped device together with a GPS device to record the location of wireless networks. The results can then be uploaded to websites like WiGLE where the data is processed to form maps of the network neighborhood. There are also clients available for smartphones running Android that can upload data directly. For better range and sensitivity, antennas are built or bought, and vary from omnidirectional to highly directional.

Wardriving can be used for both legitimate and malicious purposes. Legitimate uses of wardriving include:

  • Mapping the availability of Wi-Fi networks in a given area.

  • Identifying and troubleshooting problems with Wi-Fi networks.

  • Finding free Wi-Fi networks to use while traveling.

Malicious uses of wardriving include:

  • Gaining unauthorized access to Wi-Fi networks.

  • Stealing data from devices connected to Wi-Fi networks.

  • Launching attacks against devices connected to Wi-Fi networks.

WIGLE Mapp

WIGLE WarDriving APP

WIFI WarDriving Tool

Assembled WarDriver

DIY Assembled WarDriver

To learn about the process of Building a DIY Assembled WarDriver you can watch this YouTube video created by 463n7.

Other Prebuild WIFI Pentesting Tools(Hardware)

ESP32 Marauder (Project by JustCallMeKoko)

ESP32 Marauder is a Wi-Fi deauther project created by the hacker and maker "justcallmekoko" using the ESP32 microcontroller. The ESP32 Marauder is designed to detect and disrupt Wi-Fi networks by sending deauthentication (deauth) packets to targeted devices, forcing them to disconnect from their networks.

The ESP32 Marauder can be used for various purposes, such as security testing, network monitoring, or learning about Wi-Fi deauthentication attacks. It comes with a built-in OLED display and a web interface for configuration and control. The device can be powered using a USB cable or battery, making it portable and easy to use in different environments.

As with any security tool, it is important to use the ESP32 Marauder responsibly and with the appropriate authorization and legal permission.

Buy Your ESP32 Marauder:

To learn about the process of Building a DIY ESP32 Marauder you can watch this YouTube video created by Just Call Me Koko.

ESP8266 WIFI Captive Portal

ESP8266 Router Honeypot

ESP BUG

To learn about ESP BUG you can watch this YouTube video created by SecurityFWD.

AlexLynd ESP-Bug

To learn about the process of Building a DIY AlexLynd ESP-Bug you can watch this YouTube video created by Hak5.

willmendil ESPBug

To learn about the process of Building a DIY willmendil ESPBug you can watch this YouTube video created by MyLittleRobot.

Build your own DIY WIFI Pineapple

  • TP-Link TL-MR3020:

  • GL AR-150 / GL-AR750S:

  • Buffalo WZR-HP-G450H or Buffalo WZR-HP AG300H or TP-Link Archer C7 v4:

  • Other hardware:

Other WIFI Pentesting Tools(Software)

Airbase-ng

Lazy Script

Fluxion Tool

kismet

DNS Chef

Ettercap

Last updated