Skip to main content
Microsoft 365
December 29, 2022

What is a wardriving attack?

The term wardriving was coined by Peter Shipley, a computer security consultant who created a software that interacts with global positioning systems (GSP). Wardriving is a method of hacking that can allow unauthorized users to gain access to a Wi-Fi network. Once inside the network, hackers can access the computers and devices that are connected to the network, install malware, and steal information such as private files or credit card information. It’s important to take steps to protect your home network against potential wardriving attacks to keep your personal data safe.

How do wardriving attacks work?

Wardriving is a hacking method in which a hacker uses hardware and software to find and gain access to unsecure Wi-Fi networks. Hackers are able to gain access to unsecure networks by decrypting the wireless router or cracking passwords using software. Then, the hacker can record these network locations in a process called point mapping and can share this unauthorized information with websites and third-party apps.

While wardriving involves driving around an area in a vehicle to locate vulnerable networks, similar processes can occur on foot or on bike. The hacking process is the same, but the term may vary based on the hacker’s mode of transportation (warbiking, warjogging, warrailing, warwalking, etc.).

Microsoft Defender Banner
Microsoft 365 Logo

Microsoft Defender

Stay safer online with one easy-to-use app1

1Microsoft 365 Personal or Family subscription required; app available as separate download

Learn More

Key components of wardriving

There are both software and hardware components required for wardriving (and warbiking, warjogging, or warwalking). Attackers must utilize a combination of tools to execute a wardriving attack.

Wardriving software

There are numerous software applications that a hacker might use to help crack passwords and decrypt network routers, including packet sniffers, signal strength testers, and traffic analyzers. Since wardriving happens on the move, wardriving software is typically run on a laptop computer or a mobile device. After data has been collected, an attacker may share the information they’ve gathered on public platforms or map software.

Wardriving hardware

A wardriving attack can be completed with generic hardware such as Raspberry Pi—a popular single-board computer—that has the ability to connect to GPS devices.

Wardriving antenna

An antenna attached to a moving vehicle helps the hacker detect vulnerable networks running on 2.4 GHz radio frequency. Most antennas, including omnidirectional antennas, can detect networks from miles away.

Bluetooth wardriving

Hackers can also use Bluetooth to detect vulnerable wireless networks, since Bluetooth also operates on 2.4 GHz radio frequency. Bluetooth wardriving allows hackers to collect data shared from unsecure devices.

Is wardriving against the law?

Wardriving falls in a legal gray area—there are no laws specifically prohibiting collecting data from wireless networks or generating network maps but accessing private or corporate networks can veer into criminal territory.

“A wardriving attack can leave any device connected to your home Wi-Fi network vulnerable to data theft.”

How to protect against a wardriving attack

A wardriving attack can leave any device connected to your home Wi-Fi network vulnerable to data theft, which is why it’s essential to take steps to secure your home wireless network against attackers. Get in the habit of taking the following precautions to keep your devices and data safe:

  • Change your Wi-Fi password from the default factory password. When you purchase a wireless plan, the router generally comes with a username and password. Taking the time to customize the username and create a strong password makes it more difficult for hackers to infiltrate your network.
  • Turn off your Wi-Fi router when you’re not using it. A router that’s turned off can’t be hacked—if you’re going out of the day or not planning on using the internet for an extended period of time, it’s wise to power off your router.
  • Review your network settings to ensure that you’re up to date with the latest security patches. Security patches reinforce potential vulnerabilities to keep you network secure.
  • Set up encryption on your router, so that users are only able to access the router by entering the correct password.
  • Put up a firewall for an added level of security. A firewall will monitor requests for access and block unauthorized activity.

By keeping your network security updated and taking basic safety precautions, you can protect your home wireless against becoming a target of a wardriving attack. From identity theft to financial loss, wardriving attacks can have harsh results for those that leave themselves and their personable data vulnerable to hackers.

Get started with Microsoft 365

It’s the Office you know, plus the tools to help you work better together, so you can get more done—anytime, anywhere.

Buy Now

Topics in this article

Microsoft 365 Word, Excel, PowerPoint, Outlook, OneDrive, and Family Safety Apps
Microsoft 365 Logo

Everything you need to achieve more in less time

Get powerful productivity and security apps with Microsoft 365

Buy Now

Explore Other Categories