I got an overwhelming response to my Wardriving at Delhi project and have got a lot of emails regarding the same. I am so thrilled that so many people want to contribute to the project. Inspired by your feedback, I am here by producing here an update to my mapping project. This time I went Via Saket to Gurgaon and as usual I got a lot of access points which were OPEN with no security, WEP secured vulnerable access points & WPA/WPA PSK2 secured points.
As usual, I used -
theprohack.com . You can also read how to Hack Wifi using Backtrack , How to detect if someone is using your WiFi or how to detect WiFi hotspots . If you are having an Android, you can also read about how to use your Android for Wardriving.
Happy Wardriving.
As usual, I used -
- Kismet
- Moocherhunter
- Aircrack
- G-MON & WiGLE
- The security awareness of people and organizations
- The devices they are using
- The security mechanisms they are using.
- Wifi range analysis of individual device.
- Hotspot details / BSSID (See if you are on the list) =))
- Google Maps KML Data (See it in Google Maps)
Happy Wardriving.
About the author : Rishabh Dangwal
Rishabh Dangwal is a no-nonsense network geek who has got a thing for guitars,
retro games and emulators. When he is not tinkering with devices and gadgets,
he can be found reading novels by Fredrick Forsyth. Follow him on Twitter
retro games and emulators. When he is not tinkering with devices and gadgets,
he can be found reading novels by Fredrick Forsyth. Follow him on Twitter
No comments:
Post a Comment