Wireless wardriving involves searching for wireless networks from a moving vehicle using specialized software and equipment. Information such as network location, signal strength, and encryption status is collected anonymously. Unauthorized use of unencrypted networks, known as piggybacking, can lead to hacking and privacy breaches. Wireless networks are vulnerable to wardriving, but data collection is not illegal.
Wireless wardriving is the practice of searching for wireless networks from a moving vehicle. Wardrivers are able to gather information anonymously by simply driving through a neighborhood with some readily available equipment and software. Using a global positioning system (GPS) and a laptop, portable game console or personal digital assistant (PDA), the wardriver is able to find the service set identifier (SSID) of a network, a identification code for that network. As the vehicle moves through an area, the wardriver collects SSID numbers and locations, as well as information such as signal strength and whether the network is encrypted.
Specialized software is required for wireless wardriving. Wardrivers can easily find commercial and “homemade” software that will allow most computer operating systems and many handheld devices to gather information from any network within range. Many of these programs are free to download.
Of course, any computer, PDA, or similar device will need to be able to receive wireless signals for use in warfare. Hardware not already prepared for network connections can be equipped with a wireless network card. These boards are widely available, inexpensive, and easy to install.
By identifying an unencrypted network, the wardriver is able to use that connection to access the Internet and any computer, console or other device on that network. Unauthorized use of wireless networks is usually referred to as piggybacking. The information obtained through wireless wardriving not only gives the piggybacker free access to the Internet, but any Internet activity could be traced back to the network being used. Piggybacking also allows access to computers, consoles and other devices on the network, making private records and personal files vulnerable to hacking.
The term wireless wardriving originally referred only to the process of gathering network information, not using this information for piggybacking, although some people use the terms interchangeably. “Wardriving” is a variation of the term “wardialing,” a hacking technique used in the 1983 film WarGames, after which the practice is named. Wardialing uses a computer to quickly dial telephone numbers until an active modem is found. Wireless wardriving is an updated version of this practice.
Networks are inherently vulnerable to wireless wardriving. They were designed to allow access to any device within range. Furthermore, wireless wardriving is not illegal and there are no penalties for data collection. Only the act of piggybacking is considered a crime in most jurisdictions.
Protect your devices with Threat Protection by NordVPN