SlideShare uma empresa Scribd logo
1 de 13
SUBMITTED BY: 
MONIKA 
16 
M.TECH-3RD SEM
INTRODUCTION 
SOFTWARES USED FOR WARDRIVING 
HOW CAN WE GO FOR WARDRIVING 
WARDRIVING RULES 
WAYS TO PROTECT YOUR NETWORK 
CONCLUSION
 Wardriving is searching for Wi-Fi wireless 
networks by moving vehicle. It involves using 
a car or truck and a Wi-Fi-equipped 
computer, such as a laptop or a PDA, to detect 
the networks. 
 Many wardrivers use GPS devices to measure 
the location of the network find and log it on a 
website. For better range, antennas are built 
or bought, and vary from omnidirectional to 
highly directional.
 NetStumbler for Windows 
 Kismet for Linux 
 KisMac for Macintosh.
GPS 
Mouse 
802.11 network 
sniffing software 
(e.g. Netstumbler) 
Text to speech software 
"new network found. ssid is thd-wireless. 
channel 6. network 
open." 
Power 
Cable 
Notebook 
computer 
GPS 
Software 
Display
My House
Do Not Connect 
Obey traffic laws 
Obey private property and no-trespassing 
signs 
Don't use your data for personal gain 
 Be like the hiker motto of 'take only pictures, 
leave only footprints 
 Speak intelligently to others 
 Avoid Auto Connection 
If/When speaking to media, remember you 
are representing the community
 Enable encryption on your access point. 
 Set the router access password. 
 Enable MAC Address filtering. 
 Don't disable the 'SSID Broadcast'. 
 Disable remote login. 
 Disable wireless administrating.
 Most hackers or wardriving hobbyists use freeware tools such as 
NetStumbler, or Kismet. 
 These software programs can be used for the wholly legitimate 
purpose of helping network administrators make their systems 
more secure. They work by detecting the service set identifier 
(SSID) number that wireless networks continuously broadcast to 
identify themselves to their authorized users. 
 Commercial services such as Wi-Finder provide maps of wireless 
networks that provide free or paid public Internet access.
Wardriving

Mais conteúdo relacionado

Mais procurados

Bluejacking
BluejackingBluejacking
Bluejackingss30
 
Introduction to tcpdump
Introduction to tcpdumpIntroduction to tcpdump
Introduction to tcpdumpLev Walkin
 
Sixth sense technology (2)
Sixth sense     technology (2)Sixth sense     technology (2)
Sixth sense technology (2)Manish Upadhyay
 
Wearable computer
Wearable computer Wearable computer
Wearable computer masood tariq
 
Graphics processing unit ppt
Graphics processing unit pptGraphics processing unit ppt
Graphics processing unit pptSandeep Singh
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detectionMueenudheen Shafaquath V P
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSHHemant Shah
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technologyrahuldikonda
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communicationAbhirami P S
 
Linux Porting to a Custom Board
Linux Porting to a Custom BoardLinux Porting to a Custom Board
Linux Porting to a Custom BoardPatrick Bellasi
 
Smart quill presentation by vikas
Smart quill presentation by vikasSmart quill presentation by vikas
Smart quill presentation by vikasVikas Gupta
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phoneAkshitha Chutke
 

Mais procurados (20)

skinput technology
skinput technologyskinput technology
skinput technology
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Introduction to tcpdump
Introduction to tcpdumpIntroduction to tcpdump
Introduction to tcpdump
 
Sixth sense technology (2)
Sixth sense     technology (2)Sixth sense     technology (2)
Sixth sense technology (2)
 
Wearable computer
Wearable computer Wearable computer
Wearable computer
 
Graphics processing unit ppt
Graphics processing unit pptGraphics processing unit ppt
Graphics processing unit ppt
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detection
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Skinput Technology
Skinput TechnologySkinput Technology
Skinput Technology
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
 
Sixth sense presentation
Sixth sense presentationSixth sense presentation
Sixth sense presentation
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Smart quill
Smart quillSmart quill
Smart quill
 
Linux Programming
Linux ProgrammingLinux Programming
Linux Programming
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communication
 
Smart quill
Smart quillSmart quill
Smart quill
 
Linux Porting to a Custom Board
Linux Porting to a Custom BoardLinux Porting to a Custom Board
Linux Porting to a Custom Board
 
Smart quill presentation by vikas
Smart quill presentation by vikasSmart quill presentation by vikas
Smart quill presentation by vikas
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 

Destaque

Radio waves used in media technology
Radio waves used in media technologyRadio waves used in media technology
Radio waves used in media technologyKazim Pardhan
 
WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013Gabor Sebastiani
 
WardivingHackedBussinesWifi
WardivingHackedBussinesWifiWardivingHackedBussinesWifi
WardivingHackedBussinesWifiAdul Andreas
 
Wardriving & Kismet Introduction
Wardriving & Kismet IntroductionWardriving & Kismet Introduction
Wardriving & Kismet IntroductionLance Howell
 
UPC router reverse engineering - case study
UPC router reverse engineering - case studyUPC router reverse engineering - case study
UPC router reverse engineering - case studyDusan Klinec
 
Wearable computers
Wearable computersWearable computers
Wearable computersSteffilazar
 
The use and importance of radio waves
The use and importance of radio wavesThe use and importance of radio waves
The use and importance of radio wavesjustse
 
Jini technology
Jini technologyJini technology
Jini technologyRenuSuren
 
Robotic car project presentation
Robotic car project presentationRobotic car project presentation
Robotic car project presentationAkshay Parmar
 
Domain-Driven Data
Domain-Driven DataDomain-Driven Data
Domain-Driven DataDATAVERSITY
 
Blackberry Powerpoint[1]
Blackberry Powerpoint[1]Blackberry Powerpoint[1]
Blackberry Powerpoint[1]guestac8ea2
 

Destaque (20)

Radio waves used in media technology
Radio waves used in media technologyRadio waves used in media technology
Radio waves used in media technology
 
WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013
 
WardivingHackedBussinesWifi
WardivingHackedBussinesWifiWardivingHackedBussinesWifi
WardivingHackedBussinesWifi
 
Wardriving & Kismet Introduction
Wardriving & Kismet IntroductionWardriving & Kismet Introduction
Wardriving & Kismet Introduction
 
Social Media
Social MediaSocial Media
Social Media
 
UPC router reverse engineering - case study
UPC router reverse engineering - case studyUPC router reverse engineering - case study
UPC router reverse engineering - case study
 
Kismet
KismetKismet
Kismet
 
Soft computing
Soft computingSoft computing
Soft computing
 
Daknet
DaknetDaknet
Daknet
 
Wearable computers
Wearable computersWearable computers
Wearable computers
 
The use and importance of radio waves
The use and importance of radio wavesThe use and importance of radio waves
The use and importance of radio waves
 
Turbo code
Turbo codeTurbo code
Turbo code
 
Jini technology
Jini technologyJini technology
Jini technology
 
Xml
XmlXml
Xml
 
Robotic car project presentation
Robotic car project presentationRobotic car project presentation
Robotic car project presentation
 
Domain-Driven Data
Domain-Driven DataDomain-Driven Data
Domain-Driven Data
 
Nanorobotics
NanoroboticsNanorobotics
Nanorobotics
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
 
daknet
daknetdaknet
daknet
 
Blackberry Powerpoint[1]
Blackberry Powerpoint[1]Blackberry Powerpoint[1]
Blackberry Powerpoint[1]
 

Semelhante a Wardriving

Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingShivamSharma909
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 AssignmentLaura Aviles
 
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxDomain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxInfosectrain3
 
a-presentation-on-wireless-communication
 a-presentation-on-wireless-communication a-presentation-on-wireless-communication
a-presentation-on-wireless-communicationjhcid
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis MPhil/MRes/BSc
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detectionmtamilpriya
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxmahendrarm2112
 

Semelhante a Wardriving (20)

Wlan security
Wlan securityWlan security
Wlan security
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Meshcom Modules Brochure
Meshcom Modules BrochureMeshcom Modules Brochure
Meshcom Modules Brochure
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
 
Public wifi
Public wifiPublic wifi
Public wifi
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxDomain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptx
 
a-presentation-on-wireless-communication
 a-presentation-on-wireless-communication a-presentation-on-wireless-communication
a-presentation-on-wireless-communication
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
GSM Proximity Platform
GSM Proximity PlatformGSM Proximity Platform
GSM Proximity Platform
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 

Mais de Monika Deswal

Sahara scam power point
Sahara scam power pointSahara scam power point
Sahara scam power pointMonika Deswal
 
FUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENTFUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENTMonika Deswal
 
Dissertation Project slide share
Dissertation Project  slide share Dissertation Project  slide share
Dissertation Project slide share Monika Deswal
 
Dissertation report on performance appraisal
Dissertation report  on performance appraisalDissertation report  on performance appraisal
Dissertation report on performance appraisalMonika Deswal
 
Analysis of Discrepancies in OD
Analysis of Discrepancies in ODAnalysis of Discrepancies in OD
Analysis of Discrepancies in ODMonika Deswal
 
Benefits determination process
Benefits determination processBenefits determination process
Benefits determination processMonika Deswal
 
Chapter 5 job evaluation 2
Chapter 5 job evaluation 2Chapter 5 job evaluation 2
Chapter 5 job evaluation 2Monika Deswal
 
Project report on employees satisfaction
Project report on employees satisfactionProject report on employees satisfaction
Project report on employees satisfactionMonika Deswal
 
Summer internship ppt
Summer internship pptSummer internship ppt
Summer internship pptMonika Deswal
 
Computer Generations
Computer GenerationsComputer Generations
Computer GenerationsMonika Deswal
 

Mais de Monika Deswal (13)

Sahara scam power point
Sahara scam power pointSahara scam power point
Sahara scam power point
 
FUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENTFUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENT
 
Dissertation Project slide share
Dissertation Project  slide share Dissertation Project  slide share
Dissertation Project slide share
 
Dissertation report on performance appraisal
Dissertation report  on performance appraisalDissertation report  on performance appraisal
Dissertation report on performance appraisal
 
Analysis of Discrepancies in OD
Analysis of Discrepancies in ODAnalysis of Discrepancies in OD
Analysis of Discrepancies in OD
 
Benefits determination process
Benefits determination processBenefits determination process
Benefits determination process
 
Chapter 5 job evaluation 2
Chapter 5 job evaluation 2Chapter 5 job evaluation 2
Chapter 5 job evaluation 2
 
Ratan tata
Ratan tataRatan tata
Ratan tata
 
Project report on employees satisfaction
Project report on employees satisfactionProject report on employees satisfaction
Project report on employees satisfaction
 
Summer internship ppt
Summer internship pptSummer internship ppt
Summer internship ppt
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Carnivore
CarnivoreCarnivore
Carnivore
 

Wardriving

  • 1. SUBMITTED BY: MONIKA 16 M.TECH-3RD SEM
  • 2. INTRODUCTION SOFTWARES USED FOR WARDRIVING HOW CAN WE GO FOR WARDRIVING WARDRIVING RULES WAYS TO PROTECT YOUR NETWORK CONCLUSION
  • 3.  Wardriving is searching for Wi-Fi wireless networks by moving vehicle. It involves using a car or truck and a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks.  Many wardrivers use GPS devices to measure the location of the network find and log it on a website. For better range, antennas are built or bought, and vary from omnidirectional to highly directional.
  • 4.
  • 5.  NetStumbler for Windows  Kismet for Linux  KisMac for Macintosh.
  • 6.
  • 7. GPS Mouse 802.11 network sniffing software (e.g. Netstumbler) Text to speech software "new network found. ssid is thd-wireless. channel 6. network open." Power Cable Notebook computer GPS Software Display
  • 8.
  • 10. Do Not Connect Obey traffic laws Obey private property and no-trespassing signs Don't use your data for personal gain  Be like the hiker motto of 'take only pictures, leave only footprints  Speak intelligently to others  Avoid Auto Connection If/When speaking to media, remember you are representing the community
  • 11.  Enable encryption on your access point.  Set the router access password.  Enable MAC Address filtering.  Don't disable the 'SSID Broadcast'.  Disable remote login.  Disable wireless administrating.
  • 12.  Most hackers or wardriving hobbyists use freeware tools such as NetStumbler, or Kismet.  These software programs can be used for the wholly legitimate purpose of helping network administrators make their systems more secure. They work by detecting the service set identifier (SSID) number that wireless networks continuously broadcast to identify themselves to their authorized users.  Commercial services such as Wi-Finder provide maps of wireless networks that provide free or paid public Internet access.