Skip to main content

Why WiGLE?

 In August 2018 a couple of friendly hackers who find their home in the Wireless Village introduced me to WiGLE! I was familiar with wardriving, but it was not efficient and was more, and shall we say -- purposeful. 

Wardriving has many benefits when gathered with purpose. Who am I talking about? obviously WiGLE. Prior to WiGLE, I used a few tools like airmon-ng/airdump-ng, and then processed everything either through tshark, Wireshark, tcpdump, and NetworkMiner. So, I never had a need to get into wardriving, per se. The group introduced me, and that's how it all got started! 

So why wardriving? WiGLE's scoring system and groups make it way more fun. There are many great was wardriving helps others - and I stole these points right from the WiGLE FAQ section, and added a few of my own. 

  • It's fun: time to compete with others around the world! 
    • WiGLE has given me the opportunity to make new friends! Some of us are spread across the world, but we're all able to work on a team together to increase our team rank. We're doing pretty good. 
    • The group that made and maintains WiGLE are an awesome set of people too!
  • It's moderately accessible: whether you're scooting, walking, bussin', driving, you can map networks!
  • It helps others look for free wifi! Millions of Americans rely on free wifi, particularly from places like libraries. 
    • In my dnsprincess-opinion, the internet is a utility that should be provided for, but unfortunately, it's not. If you're curious about the debate around broadband, read this article.
  • Journalism: "WiGLE is a handy resource for journalists looking for data points on Wifi proliferation, statistics, and security. WiGLE keeps statistics on manufacturer distribution, top SSID's, encryption modes, channel selection, geographic distribution and much more."
  • Site surveys and perimeter network access: Site surveys help businesses understand what networks they have present at their facility if the APs need their channels or power adjusted, etc. WiGLE can help identify employee-created networks or malicious APs. 
  • Research Projects & Class Assignments! I've made a handful of network security assignments based on using the information found from WiGLE. Most of the time I link to digital forensics. Here's an example question:
    • You've received a phone for forensic processing. One of the artifacts you found was the last wireless network the phone was connected to at the time of the crime 88:3d:24:b5:ce:6b 
    • What type of device what found? What was the location of the device? Is this a reliable network to establish a location? (ps the last answer is no.
  • Helping others and the public: It's important for everyone to understand their network affects their personal security. "Most users didn't realize that their private networks could be accessed by anyone in the area (at various distances with antennas and amplifiers). WiGLE, and Wardriving in general, helped to educate users and put pressure on manufacturers to make network security better and easier. Nowadays WPA2 is the standard and defaults to "on" for most manufactured devices."
  • Creates a community of fun hackers! Check out the wireless village

In the next post I'll talk about my covert cute setup (warwalking, warscootin'), and my truck setup (wardriving)! Until then, find an old laptop and run kismet or get an android phone and download WiGLE! You can sign up for an account and sign up now!

Comments

Popular posts from this blog

How to program a NTAG215 NFC Tag

Hi! Did you just acquire a NTAG215 NFC tag? Very cool. Maybe you scanned it and it brought you here. Here's how to edit the content on the tag to make it do what you want.  Easy Steps Download an NFC writing app on a smartphone like this one for Android or this one for iPhone. I assume you might have this app already if you're reading this tag. Done Decide what type of data you want to save. If you picked up more than one of the NFC tags, you may have a variety of data saved to them like the ones below: Plain text URL/URI Link to a search Social networks Video File Application Mail Contact Phone number SMS Location Address Proximity search Street View Emergency info Bitcoin address Bluetooth connection WiFi network settings other custom fields Make sure if you select the correct format to make it easier to scan, save the write data, and re-scan the tag. Switch back to the read function and test your tag! Next Method The above method doesn't cover making everything, such a...

Phishing Kits

Let's make a phishing attack (just kidding). The easiest way to do so is obtaining a pre-made phishing kit. Phishing kits represent a significant and growing danger. These tools, readily available in the darker corners of the internet, empower even technically unsophisticated criminals to launch effective phishing campaigns. This post aims to demystify phishing kits, explore their dangers, and provide practical advice on safeguarding against these insidious threats.  Phishing kits are pre-packaged sets of tools and resources designed to facilitate phishing attacks. The parts of a phishing kit can be broken down into the following components: Email templates Webpage clones (usually scraped from the legit site) Scripts and code repositories  Hosting Platforms Delivery Systems Readme & docs Premium services Real-time data analysis tools Customer service* Social engineering tools These kits are designed for ease of use, allowing attackers to launch phishing campaigns with mini...

Anti-Phishing Working Group Report from Q2 2023

 The Anti-Phishing Working Group (APWG) is an international coalition focused on unifying the global response to cybercrime, particularly phishing and e-mail fraud. Established in 2003, APWG brings together businesses, government entities, law enforcement, and non-governmental organizations to combat phishing, crimeware, and e-mail spoofing.They create regular reports on the nature of phishing "in the wild" and share trends in this report. You can download the report here .  I wanted to report on a more recent trend report, but at the time of writing I haven't seen a newer one. It being in the middle of 2023, I believe the report is recent enough.  I found a few areas of interest, and questioned a few pieces. There was a reported downward trend in phishing. Despite the high numbers, there was a notable downward trend in phishing by the end of the quarter, indicating a possible shift in tactics or improved countermeasures. I have doubt that phishing is occurring less,...