SlideShare uma empresa Scribd logo
1 de 13
SUBMITTED BY: 
MONIKA 
16 
M.TECH-3RD SEM
INTRODUCTION 
SOFTWARES USED FOR WARDRIVING 
HOW CAN WE GO FOR WARDRIVING 
WARDRIVING RULES 
WAYS TO PROTECT YOUR NETWORK 
CONCLUSION
 Wardriving is searching for Wi-Fi wireless 
networks by moving vehicle. It involves using 
a car or truck and a Wi-Fi-equipped 
computer, such as a laptop or a PDA, to detect 
the networks. 
 Many wardrivers use GPS devices to measure 
the location of the network find and log it on a 
website. For better range, antennas are built 
or bought, and vary from omnidirectional to 
highly directional.
 NetStumbler for Windows 
 Kismet for Linux 
 KisMac for Macintosh.
GPS 
Mouse 
802.11 network 
sniffing software 
(e.g. Netstumbler) 
Text to speech software 
"new network found. ssid is thd-wireless. 
channel 6. network 
open." 
Power 
Cable 
Notebook 
computer 
GPS 
Software 
Display
My House
Do Not Connect 
Obey traffic laws 
Obey private property and no-trespassing 
signs 
Don't use your data for personal gain 
 Be like the hiker motto of 'take only pictures, 
leave only footprints 
 Speak intelligently to others 
 Avoid Auto Connection 
If/When speaking to media, remember you 
are representing the community
 Enable encryption on your access point. 
 Set the router access password. 
 Enable MAC Address filtering. 
 Don't disable the 'SSID Broadcast'. 
 Disable remote login. 
 Disable wireless administrating.
 Most hackers or wardriving hobbyists use freeware tools such as 
NetStumbler, or Kismet. 
 These software programs can be used for the wholly legitimate 
purpose of helping network administrators make their systems 
more secure. They work by detecting the service set identifier 
(SSID) number that wireless networks continuously broadcast to 
identify themselves to their authorized users. 
 Commercial services such as Wi-Finder provide maps of wireless 
networks that provide free or paid public Internet access.
Wardriving

Mais conteúdo relacionado

Mais procurados

Gsm (Part 1)
Gsm (Part 1)Gsm (Part 1)
Gsm (Part 1)
Ali Usman
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...
Komal Patil
 

Mais procurados (20)

Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Gsm (Part 1)
Gsm (Part 1)Gsm (Part 1)
Gsm (Part 1)
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
GSM and Basics of 3G
GSM and Basics of 3GGSM and Basics of 3G
GSM and Basics of 3G
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Touchless Touchscreen Technology
Touchless Touchscreen TechnologyTouchless Touchscreen Technology
Touchless Touchscreen Technology
 
Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 
wifi
wifiwifi
wifi
 
Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 

Destaque

Wardriving & Kismet Introduction
Wardriving & Kismet IntroductionWardriving & Kismet Introduction
Wardriving & Kismet Introduction
Lance Howell
 
Wearable computers
Wearable computersWearable computers
Wearable computers
Steffilazar
 
Blackberry Powerpoint[1]
Blackberry Powerpoint[1]Blackberry Powerpoint[1]
Blackberry Powerpoint[1]
guestac8ea2
 

Destaque (20)

Radio waves used in media technology
Radio waves used in media technologyRadio waves used in media technology
Radio waves used in media technology
 
WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013WarDriving - Stockholm October 2013
WarDriving - Stockholm October 2013
 
WardivingHackedBussinesWifi
WardivingHackedBussinesWifiWardivingHackedBussinesWifi
WardivingHackedBussinesWifi
 
Wardriving & Kismet Introduction
Wardriving & Kismet IntroductionWardriving & Kismet Introduction
Wardriving & Kismet Introduction
 
Social Media
Social MediaSocial Media
Social Media
 
UPC router reverse engineering - case study
UPC router reverse engineering - case studyUPC router reverse engineering - case study
UPC router reverse engineering - case study
 
Kismet
KismetKismet
Kismet
 
Soft computing
Soft computingSoft computing
Soft computing
 
Daknet
DaknetDaknet
Daknet
 
Wearable computers
Wearable computersWearable computers
Wearable computers
 
The use and importance of radio waves
The use and importance of radio wavesThe use and importance of radio waves
The use and importance of radio waves
 
Turbo code
Turbo codeTurbo code
Turbo code
 
Jini technology
Jini technologyJini technology
Jini technology
 
Xml
XmlXml
Xml
 
Robotic car project presentation
Robotic car project presentationRobotic car project presentation
Robotic car project presentation
 
Domain-Driven Data
Domain-Driven DataDomain-Driven Data
Domain-Driven Data
 
Nanorobotics
NanoroboticsNanorobotics
Nanorobotics
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
 
daknet
daknetdaknet
daknet
 
Blackberry Powerpoint[1]
Blackberry Powerpoint[1]Blackberry Powerpoint[1]
Blackberry Powerpoint[1]
 

Semelhante a Wardriving

_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
Laura Aviles
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
adolphoyonker
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
Marynol Cahinde
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
mtamilpriya
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 

Semelhante a Wardriving (20)

Wlan security
Wlan securityWlan security
Wlan security
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Meshcom Modules Brochure
Meshcom Modules BrochureMeshcom Modules Brochure
Meshcom Modules Brochure
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
 
Public wifi
Public wifiPublic wifi
Public wifi
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxDomain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptx
 
a-presentation-on-wireless-communication
 a-presentation-on-wireless-communication a-presentation-on-wireless-communication
a-presentation-on-wireless-communication
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
GSM Proximity Platform
GSM Proximity PlatformGSM Proximity Platform
GSM Proximity Platform
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 

Mais de Monika Deswal (13)

Sahara scam power point
Sahara scam power pointSahara scam power point
Sahara scam power point
 
FUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENTFUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENT
 
Dissertation Project slide share
Dissertation Project  slide share Dissertation Project  slide share
Dissertation Project slide share
 
Dissertation report on performance appraisal
Dissertation report  on performance appraisalDissertation report  on performance appraisal
Dissertation report on performance appraisal
 
Analysis of Discrepancies in OD
Analysis of Discrepancies in ODAnalysis of Discrepancies in OD
Analysis of Discrepancies in OD
 
Benefits determination process
Benefits determination processBenefits determination process
Benefits determination process
 
Chapter 5 job evaluation 2
Chapter 5 job evaluation 2Chapter 5 job evaluation 2
Chapter 5 job evaluation 2
 
Ratan tata
Ratan tataRatan tata
Ratan tata
 
Project report on employees satisfaction
Project report on employees satisfactionProject report on employees satisfaction
Project report on employees satisfaction
 
Summer internship ppt
Summer internship pptSummer internship ppt
Summer internship ppt
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Carnivore
CarnivoreCarnivore
Carnivore
 

Wardriving

  • 1. SUBMITTED BY: MONIKA 16 M.TECH-3RD SEM
  • 2. INTRODUCTION SOFTWARES USED FOR WARDRIVING HOW CAN WE GO FOR WARDRIVING WARDRIVING RULES WAYS TO PROTECT YOUR NETWORK CONCLUSION
  • 3.  Wardriving is searching for Wi-Fi wireless networks by moving vehicle. It involves using a car or truck and a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks.  Many wardrivers use GPS devices to measure the location of the network find and log it on a website. For better range, antennas are built or bought, and vary from omnidirectional to highly directional.
  • 4.
  • 5.  NetStumbler for Windows  Kismet for Linux  KisMac for Macintosh.
  • 6.
  • 7. GPS Mouse 802.11 network sniffing software (e.g. Netstumbler) Text to speech software "new network found. ssid is thd-wireless. channel 6. network open." Power Cable Notebook computer GPS Software Display
  • 8.
  • 10. Do Not Connect Obey traffic laws Obey private property and no-trespassing signs Don't use your data for personal gain  Be like the hiker motto of 'take only pictures, leave only footprints  Speak intelligently to others  Avoid Auto Connection If/When speaking to media, remember you are representing the community
  • 11.  Enable encryption on your access point.  Set the router access password.  Enable MAC Address filtering.  Don't disable the 'SSID Broadcast'.  Disable remote login.  Disable wireless administrating.
  • 12.  Most hackers or wardriving hobbyists use freeware tools such as NetStumbler, or Kismet.  These software programs can be used for the wholly legitimate purpose of helping network administrators make their systems more secure. They work by detecting the service set identifier (SSID) number that wireless networks continuously broadcast to identify themselves to their authorized users.  Commercial services such as Wi-Finder provide maps of wireless networks that provide free or paid public Internet access.