Site icon Panda Security Mediacenter

Wardriving: What Is It + How Can You Detect It?

The origins of wardriving can be traced back to the hacking done by Matthew Broderick in the film “WarGames.” In the movie, he dialed every phone number in the area in order to find all existing computers. In 2001, that process evolved into access point mapping or wardriving, which involves finding vulnerable WiFi networks to exploit. While there are no specific laws about wardriving, the data procured can be used to exploit unsecured networks, which becomes a grey area of protecting personal privacy

What Is Wardriving?

Wardriving consists of physically searching for wireless networks with vulnerabilities from a moving vehicle and mapping the wireless access points.

Wardrivers will use hardware and software to find WiFi signals in a particular area. They may intend to only find a single network or every network within an area. Once networks are located, wardrivers will record the locations of vulnerable networks and may submit the information to third-party websites and apps to create digital maps. 

There are three primary reasons wardrivers look for unsecured WiFi. The first is to steal personal and banking information. The second is to use your network for criminal activity that you, as the owner of the network, would be liable for. The final reason is to find the security flaws of a network. Ethical hackers do this via wardriving for the purpose of finding vulnerabilities in order to improve overall security. 

Software Used for Wardriving

Wardriving on a small scale can be done with a simple app on a smartphone. Larger attacks, however, usually require an entire rig with software and hardware specifically designed for the attack. The rig includes:

How To Prevent Wardriving

Wardrivers typically engage in this type of hacking with criminal intent. While some wardriving practices are harmless, there’s also the potential for hackers to utilize your network to commit online crimes with the connection registered to you or steal personal data with the purpose of exploitation. In either case, it’s best practice to protect your WiFi network from these types of breaches.

While wardriving is less common today than it was in 2001, the problem persists. Although ethical hackers use the process to find network vulnerabilities, there is still the possibility for the more dangerous alternative—those trying to exploit weaknesses to extract data or perform illegal activities. Always protect your devices using responsible digital habits and the privacy of VPN software.

Exit mobile version