Wardriving at Delhi Updated –The OPEN, WEP & WPA faces of Delhi
I got an overwhelming response to my Wardriving at Delhi project and have got a lot of emails regarding the same. I am so thrilled that so many people want to contribute to the project. Inspired by your feedback, I am here by producing here an update to my mapping project. This time I went Via Saket to Gurgaon and as usual I got a lot of access points which were OPEN with no security, WEP secured vulnerable access points & WPA/WPA PSK2 secured points.
As usual, I used -
theprohack.com . You can also read how to Hack Wifi using Backtrack , How to detect if someone is using your WiFi or how to detect WiFi hotspots . If you are having an Android, you can also read about how to use your Android for Wardriving.
Happy Wardriving.
As usual, I used -
- Kismet
- Moocherhunter
- Aircrack
- G-MON & WiGLE
- The security awareness of people and organizations
- The devices they are using
- The security mechanisms they are using.
- Wifi range analysis of individual device.
- Hotspot details / BSSID (See if you are on the list) =))
- Google Maps KML Data (See it in Google Maps)
Happy Wardriving.