Nowadays, we use wireless networks almost everywhere, starting from home, restaurants, and cafeterias to various organizations. Because of the convenience of using the wireless internet, we sometimes connect to the Wi-Fi networks without passwords or encryption. And that gives rise to another threat to wireless networks called wardriving.
What is wardriving?
Wardriving indicates scanning and connecting to a wireless network illegitimately for malicious purposes. Attackers often do it to steal sensitive information, spread malware, or perform other illegal activities. In this attack, attackers scan a neighborhood for less secure wireless networks and connect them for malicious purposes.
How is wardriving done?
It is fairly simple for wardrivers to do wardriving. A moving car, a laptop, or other mobile devices, a GPS, and an omnidirectional antenna often solve the purpose. There are a number of software available that the attackers usually use for finding wireless access points.
Attackers usually do wardriving in the following manner :
- They place a laptop and GPS inside their car and mount the omnidirectional antenna on the top of their cars.
- They select their target area. Usually, a densely populated area with good household income is targeted.
- They start roaming in the locality in their car and scan for available wireless networks using specialized software.
- After they have collected the data, they place the location of the obtained wireless network access points on a map.
- Now, the wardrivers can upload the data on their websites, which they can later use to make more attacks.
How to detect wardrivers?
We can detect wardrivers with a system and software like Kismet. The following steps might be taken to detect wardrivers :
- Set up a stationary computer with a wireless LAN card.
- Run the software.
- Wardrivers normally emit a packet of data after detecting a wireless access point. This packet of data can be used as a signature. The software can scan for the signature and report if found.
0 Comments