Wardriving
Wardriving is the 802.11 wireless equivalent of wardialing, in which phreakers would search banks of telephone numbers looking for a modem to answer. In this way, they found computer systems that were connected to external resources by modems. Now, wardriving attackers search for wireless access points (APs) in a form of unauthorized and covert reconnaissance.
Wardriving doesn’t require special equipment, although it is typically more successful if a high-gain antenna is used. Usually, the wardriver uses a WLAN utility called a sniffer to detect access points and their SSIDs by intercepting and capturing their beacons. Examples of sniffers include Kismet and Wireshark. Wardrivers may also use Global Positioning System (GPS) software ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access