Wardriving is the act of scanning for nearby unsecured Wi-Fi networks from a moving vehicle and then mapping out the related information or recording it on a device of some kind. Denis Andzakovic from New Zealand outfitted a personal motorcycle with a Raspberry PI paired to a couple wireless routers.
While cruising, Denis can activate the setup to scan the surrounding area for wireless access points. The system collects information like the SSID and encryption type and then displays said information via a helmet-mounted HUD. The HUD updates in realtime and allows Denis to see all the resulting information right in front of him.
“When you ride through a Wi-Fi-dense area you get all these pretty colours.”
The data that Denis collects can also be visually plotted on a map thanks to geocoded information and Google Maps. Denis can even broadcast deauthentication packets right from his cruiser if he so desires. Basically, that means he can remotely disable wireless access points on his way by. Pretty crazy stuff!
Andzakovic took his rig on a demo run around the Gold Coast for the AusCERT security conference, and his findings were quite surprising. Nearly 27% of his total pingbacks resulted in the findings of a totally unsecured wireless network. Of course, a lot of that can be attributed to local businesses and hotels that offer free Wi-Fi.
More than 6% of the hits were encrypted with the WEP security standard, which is easily cracked by resourceful individuals. The remaining two-thirds of pingbacks were using modern WPA encryption methods, which is by far the most secure.
Imagine cruising around on a Sunday afternoon, Tron lightcycle style and bringing surrounding wireless networks to their knees. It’s a good thing Denis is from New Zealand! I need my home Wi-Fi to make a living, but I definitely use WPA encryption, MAC filtering and more.
What do you think of the bike? Let us know in the comments below!