SlideShare a Scribd company logo
SUBMITTED BY: 
MONIKA 
16 
M.TECH-3RD SEM
INTRODUCTION 
SOFTWARES USED FOR WARDRIVING 
HOW CAN WE GO FOR WARDRIVING 
WARDRIVING RULES 
WAYS TO PROTECT YOUR NETWORK 
CONCLUSION
 Wardriving is searching for Wi-Fi wireless 
networks by moving vehicle. It involves using 
a car or truck and a Wi-Fi-equipped 
computer, such as a laptop or a PDA, to detect 
the networks. 
 Many wardrivers use GPS devices to measure 
the location of the network find and log it on a 
website. For better range, antennas are built 
or bought, and vary from omnidirectional to 
highly directional.
 NetStumbler for Windows 
 Kismet for Linux 
 KisMac for Macintosh.
GPS 
Mouse 
802.11 network 
sniffing software 
(e.g. Netstumbler) 
Text to speech software 
"new network found. ssid is thd-wireless. 
channel 6. network 
open." 
Power 
Cable 
Notebook 
computer 
GPS 
Software 
Display
My House
Do Not Connect 
Obey traffic laws 
Obey private property and no-trespassing 
signs 
Don't use your data for personal gain 
 Be like the hiker motto of 'take only pictures, 
leave only footprints 
 Speak intelligently to others 
 Avoid Auto Connection 
If/When speaking to media, remember you 
are representing the community
 Enable encryption on your access point. 
 Set the router access password. 
 Enable MAC Address filtering. 
 Don't disable the 'SSID Broadcast'. 
 Disable remote login. 
 Disable wireless administrating.
 Most hackers or wardriving hobbyists use freeware tools such as 
NetStumbler, or Kismet. 
 These software programs can be used for the wholly legitimate 
purpose of helping network administrators make their systems 
more secure. They work by detecting the service set identifier 
(SSID) number that wireless networks continuously broadcast to 
identify themselves to their authorized users. 
 Commercial services such as Wi-Finder provide maps of wireless 
networks that provide free or paid public Internet access.
Wardriving

More Related Content

What's hot

Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
Jake K.
 
Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)
Nikhil Jain
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
Akash Thakur
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Mohammad Fareed
 
Final 5G Presentation
Final 5G PresentationFinal 5G Presentation
Final 5G Presentation
Sagar Chauhan
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
Netwax Lab
 
home networking
home networkinghome networking
home networking
Sudeb Das
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
Venkata Naga Ravi
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
ijtsrd
 
Zigbee protocol
Zigbee protocolZigbee protocol
Zigbee protocol
AithaManish
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
Ravi Teja Reddy
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
divyakalra200
 
ZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdfZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdf
P0608VikasSontakke
 

What's hot (20)

Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Vpn
VpnVpn
Vpn
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Final 5G Presentation
Final 5G PresentationFinal 5G Presentation
Final 5G Presentation
 
Steganography
SteganographySteganography
Steganography
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
home networking
home networkinghome networking
home networking
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Steganography
SteganographySteganography
Steganography
 
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
 
Zigbee protocol
Zigbee protocolZigbee protocol
Zigbee protocol
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
ZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdfZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdf
 
Info hiding
Info hidingInfo hiding
Info hiding
 

Viewers also liked

Radio waves used in media technology
Radio waves used in media technologyRadio waves used in media technology
Radio waves used in media technology
Kazim Pardhan
 
Wardriving
WardrivingWardriving
Wardriving
Sumit Kumar
 
WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013
Gabor Sebastiani
 
WardivingHackedBussinesWifi
WardivingHackedBussinesWifiWardivingHackedBussinesWifi
WardivingHackedBussinesWifi
Adul Andreas
 
UPC router reverse engineering - case study
UPC router reverse engineering - case studyUPC router reverse engineering - case study
UPC router reverse engineering - case study
Dusan Klinec
 
Kismet
KismetKismet
Kismet
Nilesh Pawar
 
Soft computing
Soft computingSoft computing
Soft computing
Nabarun Paul
 
Wearable computers
Wearable computersWearable computers
Wearable computersSteffilazar
 
The use and importance of radio waves
The use and importance of radio wavesThe use and importance of radio waves
The use and importance of radio waves
justse
 
Jini technology
Jini technologyJini technology
Jini technology
RenuSuren
 
Xml
XmlXml
Robotic car project presentation
Robotic car project presentationRobotic car project presentation
Robotic car project presentation
Akshay Parmar
 
Domain-Driven Data
Domain-Driven DataDomain-Driven Data
Domain-Driven Data
DATAVERSITY
 
Nanorobotics
NanoroboticsNanorobotics
Nanorobotics
Ashraful Hoda
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
Rachna Singh
 
daknet
daknetdaknet
daknet
aditya127
 
Blackberry Powerpoint[1]
Blackberry Powerpoint[1]Blackberry Powerpoint[1]
Blackberry Powerpoint[1]guestac8ea2
 

Viewers also liked (20)

Radio waves used in media technology
Radio waves used in media technologyRadio waves used in media technology
Radio waves used in media technology
 
Wardriving
WardrivingWardriving
Wardriving
 
WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013
 
WardivingHackedBussinesWifi
WardivingHackedBussinesWifiWardivingHackedBussinesWifi
WardivingHackedBussinesWifi
 
Social Media
Social MediaSocial Media
Social Media
 
UPC router reverse engineering - case study
UPC router reverse engineering - case studyUPC router reverse engineering - case study
UPC router reverse engineering - case study
 
Kismet
KismetKismet
Kismet
 
Soft computing
Soft computingSoft computing
Soft computing
 
Daknet
DaknetDaknet
Daknet
 
Wearable computers
Wearable computersWearable computers
Wearable computers
 
The use and importance of radio waves
The use and importance of radio wavesThe use and importance of radio waves
The use and importance of radio waves
 
Turbo code
Turbo codeTurbo code
Turbo code
 
Jini technology
Jini technologyJini technology
Jini technology
 
Xml
XmlXml
Xml
 
Robotic car project presentation
Robotic car project presentationRobotic car project presentation
Robotic car project presentation
 
Domain-Driven Data
Domain-Driven DataDomain-Driven Data
Domain-Driven Data
 
Nanorobotics
NanoroboticsNanorobotics
Nanorobotics
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
 
daknet
daknetdaknet
daknet
 
Blackberry Powerpoint[1]
Blackberry Powerpoint[1]Blackberry Powerpoint[1]
Blackberry Powerpoint[1]
 

Similar to Wardriving

Wlan security
Wlan securityWlan security
Wlan security
Upasona Roy
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
ShivamSharma909
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
infosec train
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
Ankit Anand
 
Meshcom Modules Brochure
Meshcom Modules BrochureMeshcom Modules Brochure
Meshcom Modules Brochure
Teppo-Heikki Saari
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 AssignmentLaura Aviles
 
Public wifi
Public wifiPublic wifi
Public wifi
Samuel K. Itotia
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxDomain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptx
Infosectrain3
 
a-presentation-on-wireless-communication
 a-presentation-on-wireless-communication a-presentation-on-wireless-communication
a-presentation-on-wireless-communication
jhcid
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
A. Phillip Smith
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
adolphoyonker
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis MPhil/MRes/BSc
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
mtamilpriya
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
arushi bhatnagar
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
omkar parab
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 

Similar to Wardriving (20)

Wlan security
Wlan securityWlan security
Wlan security
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Meshcom Modules Brochure
Meshcom Modules BrochureMeshcom Modules Brochure
Meshcom Modules Brochure
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
 
Public wifi
Public wifiPublic wifi
Public wifi
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxDomain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptx
 
a-presentation-on-wireless-communication
 a-presentation-on-wireless-communication a-presentation-on-wireless-communication
a-presentation-on-wireless-communication
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
GSM Proximity Platform
GSM Proximity PlatformGSM Proximity Platform
GSM Proximity Platform
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 

More from Monika Deswal

Sahara scam power point
Sahara scam power pointSahara scam power point
Sahara scam power point
Monika Deswal
 
FUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENTFUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENT
Monika Deswal
 
Dissertation Project slide share
Dissertation Project  slide share Dissertation Project  slide share
Dissertation Project slide share
Monika Deswal
 
Dissertation report on performance appraisal
Dissertation report  on performance appraisalDissertation report  on performance appraisal
Dissertation report on performance appraisal
Monika Deswal
 
Analysis of Discrepancies in OD
Analysis of Discrepancies in ODAnalysis of Discrepancies in OD
Analysis of Discrepancies in OD
Monika Deswal
 
Benefits determination process
Benefits determination processBenefits determination process
Benefits determination process
Monika Deswal
 
Chapter 5 job evaluation 2
Chapter 5 job evaluation 2Chapter 5 job evaluation 2
Chapter 5 job evaluation 2
Monika Deswal
 
Ratan tata
Ratan tataRatan tata
Ratan tata
Monika Deswal
 
Project report on employees satisfaction
Project report on employees satisfactionProject report on employees satisfaction
Project report on employees satisfaction
Monika Deswal
 
Summer internship ppt
Summer internship pptSummer internship ppt
Summer internship ppt
Monika Deswal
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
Monika Deswal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 

More from Monika Deswal (13)

Sahara scam power point
Sahara scam power pointSahara scam power point
Sahara scam power point
 
FUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENTFUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENT
 
Dissertation Project slide share
Dissertation Project  slide share Dissertation Project  slide share
Dissertation Project slide share
 
Dissertation report on performance appraisal
Dissertation report  on performance appraisalDissertation report  on performance appraisal
Dissertation report on performance appraisal
 
Analysis of Discrepancies in OD
Analysis of Discrepancies in ODAnalysis of Discrepancies in OD
Analysis of Discrepancies in OD
 
Benefits determination process
Benefits determination processBenefits determination process
Benefits determination process
 
Chapter 5 job evaluation 2
Chapter 5 job evaluation 2Chapter 5 job evaluation 2
Chapter 5 job evaluation 2
 
Ratan tata
Ratan tataRatan tata
Ratan tata
 
Project report on employees satisfaction
Project report on employees satisfactionProject report on employees satisfaction
Project report on employees satisfaction
 
Summer internship ppt
Summer internship pptSummer internship ppt
Summer internship ppt
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Carnivore
CarnivoreCarnivore
Carnivore
 

Wardriving

  • 1. SUBMITTED BY: MONIKA 16 M.TECH-3RD SEM
  • 2. INTRODUCTION SOFTWARES USED FOR WARDRIVING HOW CAN WE GO FOR WARDRIVING WARDRIVING RULES WAYS TO PROTECT YOUR NETWORK CONCLUSION
  • 3.  Wardriving is searching for Wi-Fi wireless networks by moving vehicle. It involves using a car or truck and a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks.  Many wardrivers use GPS devices to measure the location of the network find and log it on a website. For better range, antennas are built or bought, and vary from omnidirectional to highly directional.
  • 4.
  • 5.  NetStumbler for Windows  Kismet for Linux  KisMac for Macintosh.
  • 6.
  • 7. GPS Mouse 802.11 network sniffing software (e.g. Netstumbler) Text to speech software "new network found. ssid is thd-wireless. channel 6. network open." Power Cable Notebook computer GPS Software Display
  • 8.
  • 10. Do Not Connect Obey traffic laws Obey private property and no-trespassing signs Don't use your data for personal gain  Be like the hiker motto of 'take only pictures, leave only footprints  Speak intelligently to others  Avoid Auto Connection If/When speaking to media, remember you are representing the community
  • 11.  Enable encryption on your access point.  Set the router access password.  Enable MAC Address filtering.  Don't disable the 'SSID Broadcast'.  Disable remote login.  Disable wireless administrating.
  • 12.  Most hackers or wardriving hobbyists use freeware tools such as NetStumbler, or Kismet.  These software programs can be used for the wholly legitimate purpose of helping network administrators make their systems more secure. They work by detecting the service set identifier (SSID) number that wireless networks continuously broadcast to identify themselves to their authorized users.  Commercial services such as Wi-Finder provide maps of wireless networks that provide free or paid public Internet access.