Wardriving - History, tools, and today

Wardriving: The History, the Tools, and How It Works Today

Wardriving is the practice of moving through physical space while scanning for WiFi networks, typically with the goal of recording their locations, SSIDs, security configurations, and signal strengths. The name comes from "wardialing" - the 1980s practice of dialing sequential phone numbers to find modems - adapted for wireless networks and cars.

It's older than most people realize, has a legitimate research and security auditing role, and is often misunderstood. Here's the full picture - from the WEP era to modern passive mapping tools, and where the legal and ethical lines are.

Origins: The WEP Era

Wardriving emerged in earnest around 2001-2002, shortly after 802.11b (WiFi 4, 11 Mbps) made wireless networking affordable for home and small office use. The practice was popularized by security researchers and hobbyists who noticed that a surprising percentage of the newly deployed wireless networks were either unencrypted or using WEP - and WEP had been publicly broken by early 2001.

The setup was simple: a laptop with a 802.11b card (often a Lucent/Orinoco or Prism2 chipset, which supported monitor mode), an external antenna (a "cantenna" made from a Pringles can was popular and worked surprisingly well), NetStumbler or Kismet running to log detected networks, and GPS for location tagging.

The original point wasn't criminal. The security community was trying to demonstrate to the world that wireless networks were being deployed with catastrophically bad security. Publicizing maps of open or WEP-protected networks in major cities was an effective way to make the point. The press covered it. Enterprise IT departments paid attention.

The tools were primitive by modern standards. NetStumbler was Windows-only and passive (it sent probe requests to discover networks). Kismet was Linux-based and truly passive (monitor mode, no probe requests sent). The distinction matters legally and has always been part of wardriving culture.

pie title WiFi Encryption Types Found in Wardriving Surveys (2024 estimates)
    "WPA2 (PSK + Enterprise)" : 65
    "WPA3" : 10
    "WPA (legacy)" : 5
    "WEP (critically weak)" : 3
    "Open (no encryption)" : 12
    "Hidden SSID" : 5

Approximate distribution of encryption types discovered in recent wardriving surveys - WPA2 dominates, but open and legacy networks remain common

Passive wardriving - scanning for networks, recording metadata visible in beacon frames, logging GPS coordinates - does not involve accessing any network. You're receiving radio signals that are broadcast in public space. The AP is actively transmitting that information to anyone in range.

This is analogous to walking down a street and noting that houses have mailboxes. Noting that mailboxes exist and are visible is not breaking and entering.

The legal picture varies by jurisdiction and has evolved over time. In the US, the landmark case is the FCC's investigation into Google's Street View cars, which collected payload data from unencrypted WiFi networks while mapping. The FCC fined Google for this - the distinction being that Google wasn't just collecting SSIDs from beacons (metadata visible in public spectrum) but was capturing actual data payloads from unencrypted networks. Two completely different things.

Collecting SSIDs, BSSIDs, security types, and GPS locations from beacon frames - what Wigle.net collects and what traditional wardriving tools do - has generally been treated as legal in most jurisdictions. The networks are broadcasting this information to all receivers. You're just listening.

Connecting to a network, capturing payload data from networks you haven't authorized access to, or using captured information for access - those cross the line into computer fraud territory in most jurisdictions.

The simple rule: if you're listening passively to what APs are broadcasting about themselves, you're in passive reconnaissance territory. If you're connecting, capturing traffic, or doing anything that touches data beyond the beacon frame content, you're in different legal territory.

Wigle.net: The Crowd-Sourced WiFi Map

WiGLE (Wireless Geographic Logging Engine) at wigle.net is the largest crowd-sourced WiFi network database. As of 2024, it contains over 1 billion network records contributed by users with Android apps (WiGLE WiFi Wardriving), iOS apps, and custom tools.

The data each record contains: SSID, BSSID, last GPS coordinates, first/last seen timestamps, security type, channel, and signal strength. All of this is sourced from beacon frames - nothing that required connecting to a network.

WiGLE is used by security researchers, network surveyors, and the curious. It's searchable by SSID, BSSID, and location. You can find historical data on when and where a specific network was observed. For OSINT purposes, searching Wigle for a specific AP's BSSID can reveal where that AP has historically been geolocated - useful for physical security investigations involving mobile APs.

Modern Wardriving Tools

The toolchain for modern wardriving has evolved significantly:

graph TD
    subgraph "Modern Wardriving Setup"
        subgraph "Hardware"
            LAPTOP["Laptop / Raspberry Pi"] 
            ADAPTER["WiFi Adapter
(monitor mode capable)"] GPS["GPS Receiver
(USB or built-in)"] ANTENNA["External Antenna
(optional, higher gain)"] end subgraph "Software Stack" KISMET["Kismet / Airodump-ng
(passive scanner)"] GPSD["GPSD
(GPS daemon)"] WIGLE["WiGLE Client
(upload/mapping)"] end subgraph "Data Captured (Passive)" BSSID["BSSID
(AP MAC address)"] SSID_CAP["SSID
(network name)"] CHANNEL["Channel
+ signal strength"] ENC["Encryption type
(Open/WEP/WPA2/WPA3)"] COORDS["GPS Coordinates
(lat/long/alt)"] VENDOR["Vendor OUI
(manufacturer)"] end LAPTOP --> ADAPTER LAPTOP --> GPS ADAPTER --> ANTENNA ADAPTER --> KISMET GPS --> GPSD GPSD --> KISMET KISMET --> BSSID KISMET --> SSID_CAP KISMET --> CHANNEL KISMET --> ENC KISMET --> COORDS KISMET --> VENDOR KISMET --> WIGLE end

Modern wardriving setup - passive WiFi scanning with GPS correlation to map access points without sending any traffic

Kismet is the gold standard for Linux-based passive capture. It supports multiple WiFi adapters simultaneously, handles both 2.4GHz and 5GHz, integrates GPS, logs in PCAP and Kismet's own format, and has a web interface for real-time monitoring. Kismet works in true passive mode - it doesn't send probe requests, only listens to beacons and other frames.

WiGLE WiFi Wardriving (Android) is the most accessible tool. Install the app, walk around or drive, and it automatically logs networks to a database that you can upload to WiGLE. GPS is automatic on modern phones. The Android version is actively maintained and handles both 2.4GHz and 5GHz.

airodump-ng (part of the Aircrack-ng suite) is the standard for capture-focused work. It puts an adapter into monitor mode, displays detected networks in a terminal UI, and saves captures to PCAP. Not primarily a mapping tool, but widely used for the reconnaissance phase of wireless security assessments.

Heatmapper and similar tools create visual signal strength maps by correlating GPS coordinates with received signal strength. Useful for enterprise wireless audits where you want to document coverage and identify dead zones or unexpected coverage extending outside a building.

Passive Wardriving vs Active Attacks

This distinction can't be overstated.

Passive wardriving:

  • No frames transmitted (or only broadcast probe requests in active scan mode)
  • Collects only beacon frame metadata
  • Never authenticates or associates with any network
  • Collects SSID, BSSID, security type, channel, GPS, RSSI
  • Data is publicly broadcast by APs

Active attacks (different category entirely):

  • Sending deauth frames to disconnect clients
  • Capturing 4-way handshakes (even passively capturing the handshake involves logging session data)
  • Associating with a network
  • Capturing payload traffic from connected devices
  • Running PMKID capture via association

The BLEShark Nano's WiFi scan feature is passive wardriving in a pocket-sized form. The deauth, handshake capture, and related features are active security testing tools that require authorization before use.

Modern WPA2 Wardriving

In the WEP era, a wardrive that found a WEP network meant you could decrypt traffic relatively quickly. WEP is broken at the crypto level - recovery of the key from captured frames took minutes in 2005 and takes seconds today.

WPA2 changed this. Capturing a WPA2 handshake gives you data to crack offline, but cracking requires time and compute depending on password strength. A wardrive that collects WPA2 handshakes is not immediately actionable the way a WEP capture was.

The PMKID attack made passive wardriving slightly more dangerous in the sense that a wardrive plus PMKID collection gives attackers material to crack offline without needing connected clients - but the cracking problem is the same. Weak passwords on WPA2 are vulnerable. Strong passwords aren't.

Modern wardriving research focuses less on breaking specific networks and more on the aggregate data: what security types are deployed in various cities, what percentage of networks have migrated to WPA3, how many are still open, geographic correlation between security practices and demographics. This is legitimate security research that informs policy and industry decisions.

BLEShark Nano as a Wardriving Tool

The BLEShark Nano's WiFi scan feature does passive scanning - collecting SSIDs, BSSIDs, channels, security types, and RSSI from beacon frames as you move. At $36.99, it's an approachable entry point for learning wireless scanning.

Limitations compared to a dedicated wardriving setup: 2.4GHz only (no 5GHz), no GPS integration, no continuous logging to a file for long sessions. For a quick security assessment of what's in range, it's excellent. For a methodical GPS-correlated wardrive covering a large area, you'd want a laptop with Kismet and a dedicated GPS device.

The BLEShark does add value in wardriving-adjacent scenarios where portability and battery life matter more than data volume. Walking a building footprint while logging 2.4GHz coverage, checking hotel WiFi environments, assessing what's visible from a meeting room or sensitive area - these are practical use cases where pocket-sized is a genuine advantage over a laptop setup.

With the Shiver mesh, multiple BLEShark nodes can scan simultaneously while spread across a space - useful for quick coverage mapping inside a building without walking every room yourself. Each node reports detected APs back to the master over ESP-NOW mesh (up to 16 nodes, 20-50m range), building a combined picture faster than a single device could.

What Wardriving Reveals About Your Network

Passive wardriving reveals exactly what you're broadcasting to the world:

  • Your SSID: If it includes your name, address, or company name, that's information about you.
  • Your BSSID: This can reveal your AP manufacturer and sometimes model number from the OUI prefix.
  • Your security type: Still on WPA2 when your competitors have moved to WPA3? Visible.
  • Your channel: Which channels you're congesting and where your RF footprint extends.
  • Your presence: Even a hidden SSID AP shows up in wardriving scans - the BSSID is visible even without the SSID.

For individuals: an SSID like "JohnSmith_Home" combined with a GPS coordinate is a mapping of where John Smith lives. For organizations: an SSID like "AcmeCorp-Guest" broadcasting from an unusual location during off-hours might indicate an unauthorized AP or a device being moved.

The defensive response isn't to somehow stop broadcasting beacons (you can't - that's how WiFi works). It's to be mindful of what you're broadcasting and what it reveals.

Get BLEShark Nano - $36.99+

Passive wardriving (collecting beacon frame metadata from publicly broadcast signals) is legal in most jurisdictions. Connecting to networks, capturing payload traffic, or taking any action beyond passive observation may violate computer fraud laws. Always understand your local regulations and operate within them.

Back to blog

Leave a comment