Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • WIFI WarDriving
  • What Is Wardriving?
  • WIGLE Mapp
  • WIGLE WarDriving APP
  • WIFI WarDriving Tool
  • Other Prebuild WIFI Pentesting Tools(Hardware)
  • ESP32 Marauder (Project by JustCallMeKoko)
  • ESP8266 WIFI Captive Portal
  • ESP8266 Router Honeypot
  • ESP BUG
  • Build your own DIY WIFI Pineapple
  • Other WIFI Pentesting Tools(Software)
  • WiFi Pumpkin
  • Airbase-ng
  • Lazy Script
  • Fluxion Tool
  • kismet
  • DNS Chef
  • Ettercap
  1. WIFI Attacks

Additional Information

PreviousWIFI Attack SolutionNextWIFI Cracking

Last updated 1 year ago

WIFI WarDriving

What Is Wardriving?

Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet. Warbiking, warcycling, warwalking and similar use the same approach but with other modes of transportation.

Wardrivers use a Wi-Fi-equipped device together with a GPS device to record the location of wireless networks. The results can then be uploaded to websites like WiGLE where the data is processed to form maps of the network neighborhood. There are also clients available for smartphones running Android that can upload data directly. For better range and sensitivity, antennas are built or bought, and vary from omnidirectional to highly directional.

Wardriving can be used for both legitimate and malicious purposes. Legitimate uses of wardriving include:

  • Mapping the availability of Wi-Fi networks in a given area.

  • Identifying and troubleshooting problems with Wi-Fi networks.

  • Finding free Wi-Fi networks to use while traveling.

Malicious uses of wardriving include:

  • Gaining unauthorized access to Wi-Fi networks.

  • Stealing data from devices connected to Wi-Fi networks.

  • Launching attacks against devices connected to Wi-Fi networks.

WIGLE Mapp

WIGLE WarDriving APP

WIFI WarDriving Tool

Assembled WarDriver

DIY Assembled WarDriver

Other Prebuild WIFI Pentesting Tools(Hardware)

ESP32 Marauder (Project by JustCallMeKoko)

ESP32 Marauder is a Wi-Fi deauther project created by the hacker and maker "justcallmekoko" using the ESP32 microcontroller. The ESP32 Marauder is designed to detect and disrupt Wi-Fi networks by sending deauthentication (deauth) packets to targeted devices, forcing them to disconnect from their networks.

The ESP32 Marauder can be used for various purposes, such as security testing, network monitoring, or learning about Wi-Fi deauthentication attacks. It comes with a built-in OLED display and a web interface for configuration and control. The device can be powered using a USB cable or battery, making it portable and easy to use in different environments.

As with any security tool, it is important to use the ESP32 Marauder responsibly and with the appropriate authorization and legal permission.

Buy Your ESP32 Marauder:

ESP8266 WIFI Captive Portal

ESP8266 Router Honeypot

ESP BUG

AlexLynd ESP-Bug

willmendil ESPBug

Build your own DIY WIFI Pineapple

  • TP-Link TL-MR3020:

  • GL AR-150 / GL-AR750S:

  • Buffalo WZR-HP-G450H or Buffalo WZR-HP AG300H or TP-Link Archer C7 v4:

  • Other hardware:

Other WIFI Pentesting Tools(Software)

Airbase-ng

Lazy Script

Fluxion Tool

kismet

DNS Chef

Ettercap

To learn about the process of Building a DIY Assembled WarDriver you can watch created by .

To learn about the process of Building a DIY ESP32 Marauder you can watch created by .

To learn about ESP BUG you can watch created by .

To learn about the process of Building a DIY AlexLynd ESP-Bug you can watch created by .

To learn about the process of Building a DIY willmendil ESPBug you can watch created by .

this YouTube video
463n7
this YouTube video
Just Call Me Koko
this YouTube video
SecurityFWD
this YouTube video
Hak5
this YouTube video
MyLittleRobot
WiFi Pumpkin
What Is Wardriving? | FortinetFortinet
software_3 [Wardriver.uk]
WiGLE: Wireless Network Mapping
WiGLE WiFi Wardriving - Apps on Google PlayGooglePlay
Logo
Assembled Wardriver463n7.io
GitHub - justcallmekoko/ESP32Marauder: A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32GitHub
ESP32 Marauder MiniTindie
ESP32 Marauder v6Tindie
GitHub - adamff1/ESP8266_WiFi_Captive_Portal_2.0: :key: WiFi captive portal for ESP8266 (Fake sign in)GitHub
GitHub - skickar/ESP8266_Router_Honeypot: A NAT router with an FTP honeypot using a canarytokenGitHub
GitHub - AlexLynd/ESP-Bug: ESP8266 based WiFi implant to remotely track the presence of certain people or devices via a simple web interfaceGitHub
GitHub - willmendil/ESPBug: ESPBug is a rogue captive portal program which runs on the ESP8266 dev board, such as the NodeMCU (clones included). It is a social engennering tool which generates a WiFi network of a given name alluring people to connect to it and enter some credentials.GitHub
Wifi Pineapple Mark V on TP-Link MR3020 - Zam Wiki
Logo
DIY WiFi Pineapple Guide
Logo
GitHub - xchwarze/AR150-WiFiPineapple: Converting your AR150 to a Wifi Pineapple NANOGitHub
GitHub - xchwarze/wifi-pineapple-cloner: Clone WiFi Pineapple NANO/TETRA in generic hardwareGitHub
Build your own WiFi Pineapple Tetra for $7 - Samy NeroTeam LabsNecrum Security Labs - The Blog!
Samy Younsi / Sweet-Pineapple-Builder ยท GitLabGitLab
GitHub - P0cL4bs/WiFi-Pumpkin-deprecated: DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3GitHub
airbase-ng [Aircrack-ng]
GitHub - arismelachroinos/lscript: The LAZY script will make your life easier, and of course faster.GitHub
How to Hack Wi-Fi & Networks More Easily with Lazy ScriptWonderHowTo
Logo
GitHub - FluxionNetwork/fluxion: Fluxion is a remake of linset by vk496 with enhanced functionality.GitHub
FluxionPenetration Testing Tools
Kismet: Wi-Fi, Bluetooth, RF, and moreKismet
KismetKismet
dnschef | Kali Linux ToolsKali Linux
Kali Linux / Packages / dnschef ยท GitLabGitLab
GitHub - iphelix/dnschef: DNSChef - DNS proxy for Penetration Testers and Malware AnalystsGitHub
Ettercap Home Page
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo