What Is Wardriving And How Can You Prevent It

Posted on August 6, 2017 By

Imagine a car equipped with nothing more than the laptop computer, a portable GPS recipient, and a wireless network card gradually strolls through your neighborhood. Unknown to the onlookers, this is no ordinary vehicle; instead, it is a wardriving machine. As the vehicle strolls past homes and companies, a wireless network card (available any kind of time electronics store for as low as $25) scans for any wireless access factors. Anyone with a wireless network (and there are many out there) is susceptible. The computer is looking for what is known as an SSID. An SSID will be your wireless network name and it is getting constantly transmitted by your access stage, letting computers know of its existence. The wardriver uses software for example Netstumbler (for windows) or Cismet (for linux) to scan the particular airwaves for SSIDs. The system can track various access factors at once and monitor the transmission strength. These programs can also verify if the network is encrypted. The wardriver will generally configure his / her software to log any solid unencrypted signals. Using the GPS NAVIGATION receiver, the coordinates of the solid signal will be recorded. After this particular preliminary drive, the wardriver may return to the locations that were documented, and connect to the access stage. Once connected to an unencrypted system, the wardriver can use the victim’s internet access, and can also explore computer systems on the network. If files are now being shared within someone’s private system, all of that information is susceptible to the wardriver. Furthermore, once in the system, a wardriver can sniff system traffic and can view any information for example passwords and credit card numbers a person send out to the internet – also SSL secured data. Wireless system vulnerability is a major problem, and as a lot more households purchase wireless technology, the issue of insecure networks increases. Sound scary? Well this happens every day, also it doesn’t take an expert to pull away from. It doesn’t take an expert to guard against either, however.

Steps you may make to protect against wardrivers:

There really are a number of very simple steps you can take to protect your own wireless network. For many of these, you will need to access your router configuration power (check your manual on how to do that, you will generally need to type a good IP address into your browser for example 192. 168. 0. 1 or even 192. 168. 1 . 1).

Don’t broadcast your SSID. If you might be broadcasting your SSID, this is the very first thing a program will pickup and understand. If you configure your router to not broadcast your SSID, it will probably be difficult to detect (but not not possible, for some software can sniff wifi communication, so if you are using your wifi network, the SSID can be revealed). If you are not broadcasting your SSID, but it can be guessed (such just like you are using a default SSID), cloaking is pointless. Due to this, make sure to change your SSID from the factory arrears. This is not a 100 % effective method to secure your system, but it is a good first line of protection.

Change the default password. When you buy a router, a manufacturer password is stored. People skilled in working with routers know the arrears passwords for different routers (and the particular make of the router can be seen simply by wardriver software such as netstumbler). It is important that you secure your router with a good password.

Encrypt your wifi communication. I can’t stress the importance of encrypting your wireless communication enough. Enable encryption and enter a key. Most routers are only capable of WEP encryption, but if they permit, use EAP encryption, it’s more secure than WEP. Like cloaking your SSID, encryption is not 100 percent secure. Given enough time and determination, if somebody wants to target you and access your own network, WEP encryption can be bypassed using software such as AirSnort.

Filter the MAC addresses that are permitted to connect to your router. This might require that you enter your router configuration and input the MAC PC address of each wireless card you might have. This will restrict access to ensure that only your computers can connect with the router. You will need to get the MAC address (which is the person identification address of a network cards in the form a 12 number hexadecimal number). If someone sniffs traffic and detects the MAC PC address of a computer wirelessly utilizing your network, the wardriver could imitate that address and connect to the particular router, but this takes period.

If you configure file sharing on the computers, make sure it is password safeguarded. You should not share files on the networked computers unless it requires a good authenticated user to access. Set in the same user accounts on your devices so that your computers can share documents.

With these relatively simple steps, wifi network users can secure their own networks from wardrivers. Wireless systems are inherently insecure, and these ideas will merely help you greater protected your network. If someone is actually determined to gain access to your network, provided enough time, a good hacker can get accessibility. These tips will deter the standard wardriver from gaining access to your own network, however. Although these strategies are not definite security measures, they are going to change your network from being something which can be hacked in a matter of seconds, in order to something that will take a determined hacker days if not weeks of function, all of which will have to be done while in near proximity to your network.

Cyber Security     , , , , ,