Getting Started with Wardriving

A beginner-friendly path from phone-based logging to a full Kismet setup, with safety and legality built into each step.

Ready to begin your wardriving journey? This guide will walk you through your first wardriving session, from equipment setup to data analysis, with a focus on doing it legally and ethically.

Before You Start

Understand the Law

Review the legal considerations in your jurisdiction. Remember:

  • Passive detection is generally legal
  • Never connect to networks without authorization
  • Respect privacy and property rights
  • Know your local computer crime laws

Set Clear Goals

Define what you want to accomplish:

  • Personal education about wireless networks
  • Mapping networks in your neighborhood
  • Contributing data to WiGLE
  • Auditing your own network coverage
  • Security research for your organization

Your First Wardriving Session: The Easy Way

The fastest way to start is with a smartphone.

Step 1: Install WiGLE App (Android)

  1. Download "WiGLE WiFi Wardriving" from Google Play Store
  2. Grant location permissions
  3. Create a WiGLE account (optional but recommended)
  4. Review the app settings

Step 2: Configure Settings

In WiGLE app:

  • Enable GPS
  • Set logging preferences
  • Choose upload settings (auto or manual)
  • Enable battery optimization if needed

Step 3: Your First Run

  1. Mount your phone in your vehicle (safely!)
  2. Open WiGLE app
  3. Tap "Scan" to start logging
  4. Drive through your area at normal speeds
  5. Watch as networks appear on the map

Step 4: Review Your Data

After your session:

  • View networks on the map
  • Check statistics (networks found, signal strengths)
  • Upload to WiGLE database (if desired)
  • Export data for personal analysis

That's it! You've just completed your first wardriving session.

Level Up: Laptop-Based Wardriving

Ready for more detailed data? Let's set up Kismet.

Prerequisites

Hardware:

  • Laptop (Linux preferred)
  • Monitor mode capable wireless adapter
  • USB GPS receiver
  • Vehicle power solution

Skills:

  • Basic Linux command line knowledge
  • Understanding of wireless concepts
  • Patience for initial setup

Installation (Debian/Ubuntu)

Install required packages:

sudo apt update
sudo apt install kismet gpsd gpsd-clients

Add your user to necessary groups:

sudo usermod -aG kismet $USER
sudo usermod -aG dialout $USER

Log out and back in for group changes to take effect.

GPS Configuration

Configure gpsd to use your GPS receiver:

sudo nano /etc/default/gpsd

Set these values:

DEVICES="/dev/ttyUSB0"
GPSD_OPTIONS="-n"

(Adjust /dev/ttyUSB0 to match your GPS device)

Start gpsd:

sudo systemctl enable gpsd
sudo systemctl start gpsd

Test GPS:

cgps

Wait for satellite lock (shows coordinates).

Kismet Configuration

Create a basic configuration:

nano ~/.kismet/kismet_site.conf

Add:

gps=gpsd:host=localhost,port=2947
log_types=kismet,pcapng
log_prefix=/home/youruser/kismet_logs

Running Your First Kismet Session

  1. Start Kismet:

    kismet
  2. Web Interface: Open browser to http://localhost:2501

  3. Add Data Source:

    • Click "Add Source"
    • Select your wireless interface
    • Enable monitor mode
    • Start capture
  4. Monitor Progress:

    • Watch networks appear in real-time
    • View GPS track on map
    • Monitor signal strengths
    • Observe encryption types
  5. Stop Cleanly:

    • Stop capture in web interface
    • Shut down Kismet properly
    • GPS data will be in log files

First Session Tips

Route Planning:

  • Choose a 15-30 minute route for first session
  • Residential areas show good variety
  • Avoid highways (dangerous, fewer networks)
  • Plan for safe parking to review data

Safety First:

  • Never operate equipment while driving
  • Have a passenger manage the computer
  • Or configure everything before driving
  • Pull over to make adjustments

Expectations:

  • First run: 50-200 networks is typical
  • Mostly residential Wi-Fi access points
  • Mix of secured (WPA2/WPA3) and open networks
  • Signal strength varies greatly

Analyzing Your Data

In Kismet Web Interface

Real-time Analysis:

  • Device list shows all detected networks
  • Signal graph displays strength over time
  • Map view shows geographic distribution
  • Statistics tab provides summary data

Network Details: For each detected network:

  • SSID (network name)
  • BSSID (MAC address)
  • Encryption type
  • Channel usage
  • First/last seen timestamps
  • GPS coordinates
  • Signal strength (RSSI)

Exporting Data

Kismet creates several log files:

.kismet files - Full session data (open with Kismet) .pcapng files - Packet captures (open with Wireshark) GPS tracks - Can export to GPX/KML

Understanding Your Results

Common Observations:

Open Networks:

  • Usually public hotspots or poorly configured home networks
  • Guest networks
  • IoT devices with default settings

WPA2/WPA3 Networks:

  • Most modern home and business networks
  • Varying signal strengths
  • Different channels to avoid interference

Hidden SSIDs:

  • Networks with SSID broadcast disabled
  • Still detectable (not actually "hidden")
  • Shows as blank/unknown in some tools

Signal Patterns:

  • Stronger near source, weaker with distance
  • Obstacles (buildings, hills) affect strength
  • Weather can impact propagation

Best Practices

Session Management

Before Each Session:

  • Verify GPS is working
  • Check equipment batteries/power
  • Clear previous logs if needed
  • Test that everything is detecting

During Session:

  • Maintain safe driving practices
  • Don't make sudden stops/turns
  • Keep consistent speed when possible
  • Note any interesting observations

After Session:

  • Review data while fresh in memory
  • Back up important findings
  • Upload to WiGLE if contributing
  • Document any issues for next time

Data Organization

Create a structured system:

wardriving/
├── 2026-03-11-downtown/
│   ├── kismet-logs/
│   ├── notes.txt
│   └── screenshots/
├── 2026-03-15-residential/
│   ├── kismet-logs/
│   └── notes.txt

Keep session notes:

  • Date and time
  • Location/route
  • Weather conditions
  • Equipment used
  • Interesting findings
  • Problems encountered

Privacy and Ethics

Handle Data Responsibly:

  • Don't share specific addresses publicly
  • Anonymize data when posting online
  • Delete data you don't need
  • Secure your wardriving computer

Be Discreet:

  • Don't act suspicious
  • Don't trespass
  • Be prepared to explain your activity
  • Carry identification

Common Beginner Mistakes

Technical Issues

GPS Not Working:

  • Check device permissions
  • Verify gpsd configuration
  • Ensure satellite visibility (not indoors)
  • Allow time for initial satellite lock

Wireless Adapter Problems:

  • Confirm monitor mode support
  • Check driver installation
  • Verify Kismet source configuration
  • Test adapter separately first

Poor Network Detection:

  • Check antenna connection
  • Verify interface is in monitor mode
  • Ensure Kismet is actually capturing
  • Confirm channel hopping is enabled

Operational Mistakes

Trying to Do Too Much:

  • Start with simple sessions
  • Master basics before advanced features
  • One tool at a time initially

Inadequate Power:

  • Laptop batteries drain quickly
  • Always have vehicle power adapter
  • Bring backup battery packs

No Backups:

  • Equipment failures happen
  • Always back up important data
  • Test restore procedures

Next Steps

Expand Your Skills

After mastering basics:

  • Learn packet analysis with Wireshark
  • Experiment with different antennas
  • Try directional scanning
  • Contribute to WiGLE database
  • Analyze data trends over time

Join the Community

Connect with others:

  • WiGLE forums and Discord
  • Local hackerspace groups
  • DEFCON Wardriving contests
  • Security conferences
  • Online communities (Reddit r/wardriving)

Advanced Topics to Explore

  • 5GHz band scanning
  • Bluetooth device detection
  • Cellular tower mapping
  • Spectrum analysis
  • Custom antenna building
  • Automated analysis scripts
  • Geographic Information Systems (GIS)
  • RF propagation modeling

Resources for Learning

Documentation:

  • Kismet documentation (kismetwireless.net)
  • WiGLE FAQ and guides
  • Wireless standards (802.11 family)

Communities:

  • WiGLE forums
  • Wireless security subreddits
  • Hacker forums (ethical sections)
  • Local security groups

Books:

  • "Wireless Security Assessment" by various authors
  • "Hacking Exposed: Wireless Networks"
  • 802.11 protocol references

Final Thoughts

Wardriving is a journey of continuous learning. Your first session will likely reveal how much there is to discover about wireless networks. Start simple, stay legal and ethical, and gradually expand your knowledge and capabilities.

Remember: The goal is understanding wireless infrastructure and improving security, not exploiting vulnerabilities. Approach wardriving as a security researcher - professional, ethical, and always learning.

Happy wardriving!