Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1223

Wardriving

What is Wardriving?

WardrivingThe act of driving, walking or flying through an area while logging Wi-Fi access points, their SSIDs and locations to build wireless coverage maps.


Wardriving was popularized in 2001 by Peter Shipley, who paired GPS with a Wi-Fi card to map open access points in Berkeley. The name echoes 'wardialing' from the 1983 film WarGames. Modern wardrivers use Kismet, airodump-ng, Wigle WiFi or commercial probes to passively capture BSSID, channel, encryption type and GPS coordinates, then upload the results to crowd-sourced databases such as Wigle.net. The data is used by researchers, geolocation providers and red teams to identify weakly protected networks, locate corporate offices, or seed targeted attacks (PMKID, KARMA, evil-twin). Passive listening is legal in most jurisdictions, but actively associating without consent is not. Defensive measures: WPA3, hidden SSIDs are not effective; perimeter wireless monitoring and rogue-AP detection are.

Examples

  1. 01

    Hobbyists driving with a Raspberry Pi running Kismet to upload BSSIDs to Wigle.

  2. 02

    A red team mapping all WPA2-PSK networks within a kilometre of a target campus.

Frequently asked questions

What is Wardriving?

The act of driving, walking or flying through an area while logging Wi-Fi access points, their SSIDs and locations to build wireless coverage maps. It belongs to the Attacks & Threats category of cybersecurity.

What does Wardriving mean?

The act of driving, walking or flying through an area while logging Wi-Fi access points, their SSIDs and locations to build wireless coverage maps.

How does Wardriving work?

Wardriving was popularized in 2001 by Peter Shipley, who paired GPS with a Wi-Fi card to map open access points in Berkeley. The name echoes 'wardialing' from the 1983 film WarGames. Modern wardrivers use Kismet, airodump-ng, Wigle WiFi or commercial probes to passively capture BSSID, channel, encryption type and GPS coordinates, then upload the results to crowd-sourced databases such as Wigle.net. The data is used by researchers, geolocation providers and red teams to identify weakly protected networks, locate corporate offices, or seed targeted attacks (PMKID, KARMA, evil-twin). Passive listening is legal in most jurisdictions, but actively associating without consent is not. Defensive measures: WPA3, hidden SSIDs are not effective; perimeter wireless monitoring and rogue-AP detection are.

How do you defend against Wardriving?

Defences for Wardriving typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Wardriving?

Common alternative names include: War-driving, Wi-Fi mapping, Warwalking, Warflying.

Related terms