Skip to main content

Wardriving Hot-take: WiGLE Audio Features

TL;DR – Use WiGLE’s built-in audio playback to improve your wardriving! Its handy information can be relayed over audio to improve strategies to collect the most networks. Go to WiGLE WiFi – Settings > Speech Configuration Screen then, from the Network List, enable audio by clicking the menu in the upper right and select ‘Play Audio’.

When I started to use WiGLE, I noticed an audio feature. Still, I found it cumbersome, so I immediately muted it. I mean, who doesn’t like listening to music while they wardrive? 

Let’s get to it- if you’re not using the audio feature in WiGLE, you absolutely must! I imagine this audio feature is beneficial for those who walk and run-on city streets. Maybe it is not popular around the Midwest because most of us are driving or using transportation modes to travel quickly? At least that’s what I thought until I used it to drive around some sparse cities in Indiana.


Showing enabled and disabled WiGLE speech settings

GPS Status Change: Alerts if GPS signal is lost or found
Nets for run: Readout of the number of networks are in the run
New WiFi to DB: Readout of the number of the WiFi found
New cell towers to DB: Readout of number of new cells found
Queue size if > 0: I've never had any of my devices struggle to process the queue fast enough to have a backlog. But if this occurs, it will state the number of entries left to submit to the database. 
Miles in run: Report of how many miles have been traveled according to the GPS. This option is fun for working out (running, biking, hiking). 
Current time: Reads time out in the format of your device
WiFi restarts: Also rare to hear, but it will alert if the network device restarts
New Network SSID's: This will read out the SSID of each new network observed. 

First -  I don’t think many people use it. There are two main settings for WiGLE’s voice feature; the first set can be found under general settings. The second can be found under the speech configuration screen. The general settings are to play a lower pitch sound when a network is found in the current run. The second higher pitch sound will play when the network is new in your device’s database. The sound comparison is being made on the device’s local database, not your user database for WiGLE. If nothing is being found during the scan or if your scan is being throttled, you will hear nothing. Going down the highway, it’s common not to hear anything for a while until a cell tower is found. An almost constant sound 1-2 times per second should be heard. If the tone is only sounding every 20-30 seconds, the WiFi is being trolled.  As a reminder, you can turn that off in Android’s Dev settings. Keep in mind by default, WiGLE lowers the scanning frequency for slow-moving or standing still, but you should still be able to hear a tone every few seconds.

I have made some embarrassing mistakes on a past trip to a different state where I forgot to check if I had the correct setting disabled for WiFi throttling on Android. I thought I had set this device to previously never throttle and disable this setting. Still, I had forgotten, and I spent half of this trip with one phone that wasn’t scanning more than four times in two minutes. This throttling significantly hampered my score and my ability to do well. Oh - and the most recent other cities I had traveled to for wardriving had significantly fewer results for this reason. I had this idea that the cities I was wardriving were already well mapped, and I was doing it wrong. Still, no, it was because one of my devices had wild WiFi throttling enabled. I could have caught this if the audio feature was enabled. After I started using WiGLE’s audio feature, I could tell that it was WiFi throttling because I had the audio enabled on my next run with another new device. 

So as I’m going along my wardrive, I continually hear lower and higher-pitched tones. Once I get to an area that I’ve decided I should look out for all my map, I should continuously hear higher-pitched tones in succession. The frequency should let me know that I’m doing an excellent job not over covering the area. Once they start to hear some lower pitch tones between the higher pitch tones, I’ve captured some of the networks in this area, but I still have more to go. Then, as you guessed it, once I hear an area only has lower pitch tones, I know not to go there again, and it’s already been covered. This is incredibly helpful for someone like me who is geographically challenged. I know some people can map out spaces and places in their heads well, but that’s not something me and my ADHD do, OK? Therefore I can take the burden off of properly-being efficient when I drive and rely on the tone’s sound to tell me if I’ve already mapped in an area or covering one too much going from to and from targets. 


Network List showing an opened menu with 'Play Audio' option

If you didn’t read from the intro: Go to WiGLE WiFi – Settings > Speech Configuration Screen; then, from the Network List, enable audio by clicking the menu in the upper right, lastly select ‘Play Audio’. I’d love it you’d let me know how WiGLE Audio works for you; feel free to reply below.

 

Comments

Popular posts from this blog

Overwriting Deleted Files in Windows

 Once a file is deleted, most operating systems will still hold on to the file. The link between the operating system and the file is removed, but the data is still on the disk waiting to be overwritten or used for something else. A common utility seen in the wild is Eraser  but it's a bloated utility that takes a long time. It's a good utility if you really need to overwrite a Windows machine more than 3 times - but the use case for this is minimal.  pause: this article surrounds mostly HDD, as files are recoverable on these drives if not overwritten. For SSDs, this is just going to cause more wear to your drive! An underutilized tool is cipher . In Windows, it displays or alters the encryption of directories and files on NTFS volumes. But, with the option w  it overwrites deleted files and empty space of a drive. You can use it on the same drive the OS is located, external drives, and removable media. It's easy to use! If your OS is installed on C: and you want to remove

My 2021 New Year's Resolutions

  In 2019, I made my New Year's Resolution to not drink in 2020. I had no idea what 2020 had in store, and I made it until RBG died, September 18th 2020, before I drank again. Even after, I hadn't had more than a few drinks at a time since. I still plan on not drinking or getting drunk, but it inspired me to make a ton of New Year's Resolutions for 2021. Resolutions I'm not sure if I'll make any of these come true, but if I could have some success on the last resolution, maybe I can be successful with a few more. I'm not comfortable sharing every goal, but there are a few that I think maybe fun to reflect on later! Two traditional goals, and two wardriving goals!  1) Meatless Mondays 2) No Candy Wednesdays 3) Submit to Wigle every month 4) ....and the Grand Finale: Make an optimized trip half-way across the country in my truck! The first two goals are based on my consumption. I eat way too much candy and I don't have to explain why that's bad -  and I sh

Can you hack a security checkpoint metal detector? Yeah, we already did.

To get straight to the point - walkthrough metal detectors are a security technology to attempt to detect and thus remove weapons and dangerous items from individuals to make a safe space. What if they were much more fallible than expected?  I'm not here to fear-monger either - these problems are preventable with proper use and changed in guidelines. Like many security controls, their exploitation is commonly due to those who implement and monitor them. However, in order to create these changes, more proof-of-concepts and solutions need to be tested. We already have a few to start.  The walkthrough metal detector (WTMD) research was not my original idea. It started out of research projects from  PHSI  and another Garrett 6500i was donated to our lab. This machine was not ours and we did not have permission to modify or conduct digital attacks on the detector. We were supposed to use physical modifications to hide or modify the results of the screening.  One colleague in particular