Ready to begin your wardriving journey? This guide will walk you through your first wardriving session, from equipment setup to data analysis, with a focus on doing it legally and ethically.
Before You Start
Understand the Law
Review the legal considerations in your jurisdiction. Remember:
- Passive detection is generally legal
- Never connect to networks without authorization
- Respect privacy and property rights
- Know your local computer crime laws
Set Clear Goals
Define what you want to accomplish:
- Personal education about wireless networks
- Mapping networks in your neighborhood
- Contributing data to WiGLE
- Auditing your own network coverage
- Security research for your organization
Your First Wardriving Session: The Easy Way
The fastest way to start is with a smartphone.
Step 1: Install WiGLE App (Android)
- Download "WiGLE WiFi Wardriving" from Google Play Store
- Grant location permissions
- Create a WiGLE account (optional but recommended)
- Review the app settings
Step 2: Configure Settings
In WiGLE app:
- Enable GPS
- Set logging preferences
- Choose upload settings (auto or manual)
- Enable battery optimization if needed
Step 3: Your First Run
- Mount your phone in your vehicle (safely!)
- Open WiGLE app
- Tap "Scan" to start logging
- Drive through your area at normal speeds
- Watch as networks appear on the map
Step 4: Review Your Data
After your session:
- View networks on the map
- Check statistics (networks found, signal strengths)
- Upload to WiGLE database (if desired)
- Export data for personal analysis
That's it! You've just completed your first wardriving session.
Level Up: Laptop-Based Wardriving
Ready for more detailed data? Let's set up Kismet.
Prerequisites
Hardware:
- Laptop (Linux preferred)
- Monitor mode capable wireless adapter
- USB GPS receiver
- Vehicle power solution
Skills:
- Basic Linux command line knowledge
- Understanding of wireless concepts
- Patience for initial setup
Installation (Debian/Ubuntu)
Install required packages:
sudo apt update
sudo apt install kismet gpsd gpsd-clients
Add your user to necessary groups:
sudo usermod -aG kismet $USER
sudo usermod -aG dialout $USER
Log out and back in for group changes to take effect.
GPS Configuration
Configure gpsd to use your GPS receiver:
sudo nano /etc/default/gpsd
Set these values:
DEVICES="/dev/ttyUSB0"
GPSD_OPTIONS="-n"
(Adjust /dev/ttyUSB0 to match your GPS device)
Start gpsd:
sudo systemctl enable gpsd
sudo systemctl start gpsd
Test GPS:
cgps
Wait for satellite lock (shows coordinates).
Kismet Configuration
Create a basic configuration:
nano ~/.kismet/kismet_site.conf
Add:
gps=gpsd:host=localhost,port=2947
log_types=kismet,pcapng
log_prefix=/home/youruser/kismet_logs
Running Your First Kismet Session
-
Start Kismet:
kismet -
Web Interface: Open browser to http://localhost:2501
-
Add Data Source:
- Click "Add Source"
- Select your wireless interface
- Enable monitor mode
- Start capture
-
Monitor Progress:
- Watch networks appear in real-time
- View GPS track on map
- Monitor signal strengths
- Observe encryption types
-
Stop Cleanly:
- Stop capture in web interface
- Shut down Kismet properly
- GPS data will be in log files
First Session Tips
Route Planning:
- Choose a 15-30 minute route for first session
- Residential areas show good variety
- Avoid highways (dangerous, fewer networks)
- Plan for safe parking to review data
Safety First:
- Never operate equipment while driving
- Have a passenger manage the computer
- Or configure everything before driving
- Pull over to make adjustments
Expectations:
- First run: 50-200 networks is typical
- Mostly residential Wi-Fi access points
- Mix of secured (WPA2/WPA3) and open networks
- Signal strength varies greatly
Analyzing Your Data
In Kismet Web Interface
Real-time Analysis:
- Device list shows all detected networks
- Signal graph displays strength over time
- Map view shows geographic distribution
- Statistics tab provides summary data
Network Details: For each detected network:
- SSID (network name)
- BSSID (MAC address)
- Encryption type
- Channel usage
- First/last seen timestamps
- GPS coordinates
- Signal strength (RSSI)
Exporting Data
Kismet creates several log files:
.kismet files - Full session data (open with Kismet) .pcapng files - Packet captures (open with Wireshark) GPS tracks - Can export to GPX/KML
Understanding Your Results
Common Observations:
Open Networks:
- Usually public hotspots or poorly configured home networks
- Guest networks
- IoT devices with default settings
WPA2/WPA3 Networks:
- Most modern home and business networks
- Varying signal strengths
- Different channels to avoid interference
Hidden SSIDs:
- Networks with SSID broadcast disabled
- Still detectable (not actually "hidden")
- Shows as blank/unknown in some tools
Signal Patterns:
- Stronger near source, weaker with distance
- Obstacles (buildings, hills) affect strength
- Weather can impact propagation
Best Practices
Session Management
Before Each Session:
- Verify GPS is working
- Check equipment batteries/power
- Clear previous logs if needed
- Test that everything is detecting
During Session:
- Maintain safe driving practices
- Don't make sudden stops/turns
- Keep consistent speed when possible
- Note any interesting observations
After Session:
- Review data while fresh in memory
- Back up important findings
- Upload to WiGLE if contributing
- Document any issues for next time
Data Organization
Create a structured system:
wardriving/
├── 2026-03-11-downtown/
│ ├── kismet-logs/
│ ├── notes.txt
│ └── screenshots/
├── 2026-03-15-residential/
│ ├── kismet-logs/
│ └── notes.txt
Keep session notes:
- Date and time
- Location/route
- Weather conditions
- Equipment used
- Interesting findings
- Problems encountered
Privacy and Ethics
Handle Data Responsibly:
- Don't share specific addresses publicly
- Anonymize data when posting online
- Delete data you don't need
- Secure your wardriving computer
Be Discreet:
- Don't act suspicious
- Don't trespass
- Be prepared to explain your activity
- Carry identification
Common Beginner Mistakes
Technical Issues
GPS Not Working:
- Check device permissions
- Verify gpsd configuration
- Ensure satellite visibility (not indoors)
- Allow time for initial satellite lock
Wireless Adapter Problems:
- Confirm monitor mode support
- Check driver installation
- Verify Kismet source configuration
- Test adapter separately first
Poor Network Detection:
- Check antenna connection
- Verify interface is in monitor mode
- Ensure Kismet is actually capturing
- Confirm channel hopping is enabled
Operational Mistakes
Trying to Do Too Much:
- Start with simple sessions
- Master basics before advanced features
- One tool at a time initially
Inadequate Power:
- Laptop batteries drain quickly
- Always have vehicle power adapter
- Bring backup battery packs
No Backups:
- Equipment failures happen
- Always back up important data
- Test restore procedures
Next Steps
Expand Your Skills
After mastering basics:
- Learn packet analysis with Wireshark
- Experiment with different antennas
- Try directional scanning
- Contribute to WiGLE database
- Analyze data trends over time
Join the Community
Connect with others:
- WiGLE forums and Discord
- Local hackerspace groups
- DEFCON Wardriving contests
- Security conferences
- Online communities (Reddit r/wardriving)
Advanced Topics to Explore
- 5GHz band scanning
- Bluetooth device detection
- Cellular tower mapping
- Spectrum analysis
- Custom antenna building
- Automated analysis scripts
- Geographic Information Systems (GIS)
- RF propagation modeling
Resources for Learning
Documentation:
- Kismet documentation (kismetwireless.net)
- WiGLE FAQ and guides
- Wireless standards (802.11 family)
Communities:
- WiGLE forums
- Wireless security subreddits
- Hacker forums (ethical sections)
- Local security groups
Books:
- "Wireless Security Assessment" by various authors
- "Hacking Exposed: Wireless Networks"
- 802.11 protocol references
Final Thoughts
Wardriving is a journey of continuous learning. Your first session will likely reveal how much there is to discover about wireless networks. Start simple, stay legal and ethical, and gradually expand your knowledge and capabilities.
Remember: The goal is understanding wireless infrastructure and improving security, not exploiting vulnerabilities. Approach wardriving as a security researcher - professional, ethical, and always learning.
Happy wardriving!