WarDriving and How Easy It Can Be Done - How to, Technology and PC Security Forum | SensorsTechForum.com

WarDriving and How Easy It Can Be Done

online-security-sensorstechforumEver wondered how your home Wi-Fi can be hacked if someone showed interest in it? It is easier than you though, with the only challenge being getting your hands onto the proper hardware. We have decided to explain how war-driving, the process of sniffing information from different Wi-Fi networks is conducted to better inform you and raise awareness on the risks for your home network.

What is WarDriving

War driving is the process of sniffing as much information as possible from wireless networks that are in a specific range of a vehicle, like a car, for example.

What Hardware Is Needed for WarDriving

In order to WarDrive a certain machine there are several devices that are required. The first device is a mobile device, preferrably a Laptop, tablet or a smartphone which is used for managing the operation and breaking encryption. Wireless network card and an antenna are also required in order to remotely sniff out the information safely and privately. GPS system is also required to assist with the proper pinpoint of the exact location of the Wi-Fi emitting device.

Image Source: YouTube - Wardriving App https://www.youtube.com/watch?v=0wcOqUK9Nk0

Image Source: YouTube – “Wi-Fi Tracker for Android Wardriving App”

The proper software for WarDriving is also a must. You can have all the tools, but without the program which factorizes keys and detects their type (WPA, WPA2-PSK, WEP) as well as the password encryption(AES,TKIP, etc.). There are many programs that can scan for wireless networks out there. Nyxbone(Twitter: @nyxbone), a very popular white hat hacker, renders some of the most popular ones:

Linux software:
Kismet.
Swscanner
MAC Software:
KisMAC.
MacStumbler
iPhone software:
WiFi-Where
Windows software:
NetStumbler.
Insider.
Ekahau HeatMapper
Android software:
G-MoN
Wardrive

How a WarDriver Would Do It Typically

According to research at SANS Institute , most WarDrivers out there would usually choose a laptop or a tablet that has been modified because these two devices offer portativity, have relatively moderate battery capacity and are powerful enough. From there, the cyber-criminals have to choose a software to run on the laptop, where different operating systems and scanning software result in different scanning speeds.

Regarding the wireless card, the specifics for it should be that it supports all different types of wi-fi for a higher range (a/b/g/n/ac, etc.). Researchers have reported that Hermers, Prism and Aironet are the three primary chipsets that are being used for WarDriving.

Another tool that is often used is a powerful antenna that can hopefully increase the wireless range. This type of antennas are not a must, but most WarDrivers prefer them because they enable them to locate networks on a higher distance. There are antennas that spread the transmitted signal on a territory that is wide, which are known as omni-directional. These are the main choice of criminals, because unlike direction antennas they do not limit their scanning range only to where they are pointed at.

Regarding the GPS device being used there is not much to say, that most wardrivers prefer to use a standard GPS that has a USB connection to a laptop in order to pinpoint the location of the Wi-Fi router being attacked.

When all of those methods are combined with the proper usage of scanning software. Such software acts as a network sniffer. It essentially sniffs out the packers to get enough information about the Wireless network, like the password of a given router, it’s SSID, it’s MAC address and it’s port-channel. This crucial information can then be deciphered while wardriving the network, to decrypt the encrypted password and hopefully gain access.

How to Protect Yourself from WarDriving and Malware

Once you are hacked as a result of someone wardriving your wi-fi router or hotspot, the cyber-criminals may enter the hacked device by sniffing out it’s IP address and sniff out all the traffic in your house, providing them access to your information. Furthermore, if the router is not secure enough, the hackers can modify it’s DNS settings to send you phishing web pages that may infect the computers on the network with malware and also infect the router as well. This is why it is always advisable to properly secure your router, by performing several crucial activities:

  • Hiding the SSID from public view.
  • Changing default router admin username and password.
  • Making a whitelist in the router that allows only the IP addresses of your home network to connect to it.
  • Securing the devices in the network with an anti-malware program.

Download

Malware Protection Software


Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.