Log in

No account? Create an account
Wardrivers' Journal [entries|friends|calendar]

[ userinfo | livejournal userinfo ]
[ calendar | livejournal calendar ]

Todays drive [02 Mar 2008|04:47pm]

I built a rig inspired by a coworker for my EeePC in my car. It works a lot better than I imagined it would, and doesn't look that bad. It's a bit ghetto at the moment, but the foam tape is temporary (ACE didn't have the foam tubing I was looking for).

t0ast and I loaded drove until we got hungry, and about 800 networks later.
I would like to find out if the digital billboards have wifi, you can imagine where that's going ; )

The gear: My wifi bag, my Eee and a USB GPS receiver.

Car Rig: Made from steel pipes, and foam tape. Bolted to the floor.

The Maps:

9 comments|post comment

LOLz from the folks at Nellis AFB [17 Jan 2007|06:40pm]

LOLz from the folks at Nellis AFB:


Unsecured networks open door for hackers, spies

By Airman 1st Class Andrew Dumboski
99th Air Base Wing Public Affairs

NELLIS AIR FORCE BASE, Nev. (AFPN) -- With wireless technology, consumers can easily network their computers within their household and access the Internet through any of their computers.

Consumers can sit in a lawn chair on their back porch and catch up on their e-mail and news, even do some online banking. But with this newfound convenience lies a new danger.


Bla bla bla

post comment

neighbor "stealing" your wireless connection? [28 Jul 2006|09:16am]

geek takes revenge on his neighbor that is stealing his wireless connection - Upside-Down-Ternet

1 comment|post comment

GCN article: WiFi is taking flight [16 May 2006|04:00pm]

I was wondering wthat those access points were that I found in the wardriving logs.....

From Goverment Computer News (GCN):

WiFi is taking flight

By Doug Beizer,

Tucked in a corner of an airplane hangar in Iraq, an Air Force mechanic is repairing a plane’s hydraulic landing gear system when he hits a snag and needs to refer to the aircraft’s maintenance manual.

He doesn’t stop working to search for a paper manual, which may or may not be in the hangar. Instead, he pulls out a ruggedized tablet computer to access the LAN. Within minutes, he has downloaded the information he needs from a U.S.-based database and is back to work on the plane.

That scenario is a reality, said Tom Badders, director of wireless strategic development for Telos Corp. of Ashburn, Va.

Ubiquitous network connection is happening, thanks in large part to the proliferation of wireless networks for both civilian and Defense agencies.

Wireless makes sense

In many cases, wireless makes the most sense, whether it’s because of the devices people are using or because of the physical requirements of bases, buildings or conference rooms.

Telos has installed wireless networks at 85 of the Air Force’s 108 bases as well as 11 other Air Force sites worldwide, Badders said. “Primarily, it’s for maintenance and logistics operations, so we put wireless LAN coverage on flight lines, inside hangars, back shops, wherever maintenance and logistics operations are taking place.”

The wireless infrastructure extends the Air Force’s enterprise network to those whose job is to get aircraft back in the air, and increases the service’s supply chain efficiencies. Constant connection to the network lets personnel tie into maintenance databases, check tech orders on supply and logistics applications, fix equipment, update orders, read technical manuals, and order and track parts through the supply chain.


x-posted to the usual places
post comment

free wifi weekends at t-mobile [05 Mar 2006|12:05pm]

i now most of us have plenty of free wifi options, but thought id post it anyway,

if you are a t-mobile phone customer you can get free access on the weekends.

1 comment|post comment

Antenna System Designer [11 Dec 2005|09:17pm]

Seems to be a good resurce, at least something fun to toy with.

The Connect802 Antenna System Designer™
An On-Line Calculator For Tower Height, Link Budget, and Wireless Network Design Suitability Analysis

x-posted to wireless and wardrivers
post comment

[19 Oct 2005|11:44am]

[ mood | sleepy ]

Anyone else here use HAiCOM HI-305III GPS?

I have a Rino 120 I use for geocaching/hiking but also recently picked up the hiacom so I can use it with a laptop and with a PDA for in car navigation and WiFi site surveys/war driving because I'm annoyed with batteries on the Rino 120. I'm having mixed results with it so wanted to hear if anyone else has one.

Site Meter

post comment

WiFi worm [21 Sep 2005|11:18pm]

New worm/trojan appears to be spreading, it utilizes, get this, WiFi. Yes we are long over due for one of these. It seems to be over much of New Jersey but we first noticed it around Newark in the evening on 9/20/05. It appears to infect unpatched XP machines. The machines lock up and everything including regedit stops working. MS malicious code detection tool does detect it but is unable to clean it. After infection is sets the WiFi card to Ad-Hoc mode with SSID aec_le and starts requesting DHCP leases. Looks like this might actually be relying on wardrivers to spread.

More details to come as I get them.

log1Collapse )

log2Collapse )
post comment

WiFi hotspot databases [14 Aug 2005|06:48pm]

With some conversations the last few weeks (both IRL and online in a local LJ community), I have been researching what WiFi hotspot databases are worth a dam out on the evil interweb. Any suggestions? Most that I have come across have much to be desired.

Two I came across today are:
Shmoo group GAWD (Global Access Wireless Database): http://www.shmoo.com/gawd/ (not working at the moment)

Netstumber HotSpot database: http://hotspots.netstumbler.com/default.aspx

Some info on local WiFi, some hotspots, some open access points that I dug up for that LJ community thread I linked above:

x-posed to wireless & wardrivers

So, any suggestions? Are anyone still uploading their wardriving results?
post comment

Another Florida Wardriving Conviction [05 Jul 2005|02:49am]

Very similar to my last post here:

Wi-Fi cloaks a new breed of intruder

Though wireless mooching is preventable, it often goes undetected.

By ALEX LEARY, Times Staff Writer
Published July 4, 2005

ST. PETERSBURG - Richard Dinon saw the laptop's muted glow through the rear window of the SUV parked outside his home. He walked closer and noticed a man inside.

Then the man noticed Dinon and snapped his computer shut.

Maybe it's census work, the 28-year-old veterinarian told his girlfriend. An hour later, Dinon left to drive her home. The Chevy Blazer was still there, the man furtively hunched over his computer.

Dinon returned at 11 p.m. and the men repeated their strange dance.

Fifteen minutes later, Dinon called police.

Police say Benjamin Smith III, 41, used his Acer brand laptop to hack into Dinon's wireless Internet network. The April 20 arrest is considered the first of its kind in Tampa Bay and among only a few so far nationwide.

"It's so new statistics are not kept," said Special Agent Bob Breeden, head of the Florida Department of Law Enforcement's computer crime division.

But experts believe there are scores of incidents occurring undetected, sometimes to frightening effect. People have used the cloak of wireless to traffic in child pornography, steal credit card information and send death threats, according to authorities.

For as worrisome as it seems, wireless mooching is easily preventable by turning on encryption or requiring passwords. The problem, security experts say, is many people do not take the time or are unsure how to secure their wireless access from intruders. Dinon knew what to do. "But I never did it because my neighbors are older."

A drive through downtown St. Petersburg shows how porous networks can be. In less than five minutes, a Times reporter with a laptop found 14 wireless access points, six of which were wide open. "I'll guarantee there are tons of people out there who have their wireless network being exploited but have no idea," Breeden said. "And as we see more people utilizing wireless, we'll see more people being victimized."

Prolific Wi-Fi growth

Wireless fidelity, or "Wi-Fi," has enjoyed prolific growth since catching on in 2000. More than 10-million U.S. homes are equipped with routers that transmit high-speed Internet to computers using radio signals. The signals can extend 200 feet or more, giving people like Dinon the ability to use the Web in the back yard of his Crescent Heights home but also reaching the house next door, or the street.

Today someone with a laptop and inexpensive wireless card can surf the Web via Wi-Fi at Starbucks or eat a bagel and send instant messages at Panera Bread. Libraries, hotels, airports and colleges campuses are dotted with Wi-Fi "hotspots." Even entire cities are unplugging.

"The information age is over. The information is out there," said Jim Guerin, technology director for the city of Dunedin, which will soon be the first city in Florida to go completely Wi-Fi. "Now it's the connectivity age. It opens up a whole new area for ethics, legal boundaries and responsibilities. It's a whole new frontier."

There's a dark side to the convenience, though.

The technology has made life easier for high-tech criminals because it provides near anonymity. Each online connection generates an Internet Protocol Address, a unique set of numbers that can be traced back to a house or business.

That's still the case with Wi-Fi but if a criminal taps into a network, his actions would lead to the owner of that network. By the time authorities show up to investigate, the hacker would be gone.

"Anything they do traces back to your house and chances are we're going to knock on your door," Breeden said.

Breeden recalled a case a few years ago in which e-mail containing death threats was sent to a school principal in Tallahassee. The e-mail was traced back to a home, and when investigators arrived, they found a dumbfounded family. The culprit: a neighborhood boy who had set up the family's Wi-Fi network and then tapped into it.

In another Florida case, a man in an apartment complex used a neighbor's Wi-Fi to access bank information and pay for pornography sites.

But he slipped up. The man had sex products sent to his address. "The morning we did a search warrant, we found an antenna hanging out his window so he could get a better signal from his neighbor's network," Breeden said.

Last year, a Michigan man was convicted of using an unsecured Wi-Fi network at a Lowe's home improvement store to steal credit card numbers. The 20-year-old and a friend stumbled across the network while cruising around in a car in search of wireless Internet connections - a practice known as "Wardriving."

(The name has roots in the movie WarGames, in which Matthew Broderick's character uses a computer to call hundreds of phone numbers in search of computer dialups, hence "war dialing.")

A more recent threat to emerge is the "evil twin" attack. A person with a wireless-equipped laptop can show up at, say, a coffee shop or airport and overpower the local Wi-Fi hotspot. The person then eavesdrops on unsuspecting computer users who connect to the bogus network.

At a technology conference in London this spring, hackers set up evil twins that infected other computers with viruses, some that gather information on the user, the Wall Street Journal reported.

Not all encryption is rock solid, either. One of the most common methods called WEP, or Wired Equivalent Privacy, is better than nothing but still can be cracked using a program available on the Web.

"Anybody with an Internet connection and an hour online can learn how to break that," said Guerin, the Dunedin network administrator. Two years ago when the city of Dunedin first considered Wi-Fi, Guerin squashed the idea because of WEP's inadequacy.

Dunedin's network, however, will be protected by the AES encryption standard, used by the Department of Defense. Passwords will be required, and each computer will have to be authenticated by the network. There also will be firewalls. "I'm confident to say our subscribers are at zero risk for that kind of fraud," Guerin said.

Leaving the door open

Not everyone has sinister intentions. Many Wardrivers do it for sport, simply mapping the connections out there. Others see it as part public service, part business opportunity. When they find an unsecured network, they approach a homeowner and for a fee, offer to close the virtual door.

Some Wi-Fi users intentionally leave their networks open or give neighbors passwords to share an Internet connection. There is a line of thought that tapping into the network of a unsuspecting host is harmless provided the use is brief and does not sap the connection, such as downloading large music files. "There is probably some minority of people who hop on and are up to no good. But I don't know there is any sign it's significant," said Mike Godwin of Public Knowledge, a public interest group in Washington, D.C., focused on technology.

"We have to be careful," Godwin said. "There's a lot of stuff that just because it's new triggers social panic. Normally the best thing to do is sit back and relax and let things take their course ... before acting on regulation."

Randy Cohen, who writes "The Ethicist" column in the New York Times Magazine , was swayed by Godwin's thinking. When asked by a Berkeley, Calif., reader if it was okay to hop on a neighbor's Wi-Fi connection, Cohen wrote:

"The person who opened up access to you is unlikely even to know, let alone mind, that you've used it. If he does object, there's easy recourse: nearly all wireless setups offer password protection."

But, Cohen went on to ask, "Do you cheat the service provider?" Internet companies say yes.

"It's no different if I went out and bought a Microsoft program and started sharing it with everyone in my apartment. It's theft," said Kena Lewis, spokeswoman for Bright House Networks in Orlando. "Just because a crime may be undetectable doesn't make it right."

"I'll probably never know'

In a way Dinon was fortunate the man outside his home stuck around since it remains a challenge to catch people in the act. Smith, who police said admitted to using Dinon's Wi-Fi, has been charged with unauthorized access to a computer network, a third-degree felony. A pretrial hearing is set for July 11.

It remains unclear what Smith was using the Wi-Fi for, to surf, play online video games, send e-mail to his grandmother, or something more nefarious. Prosecutors declined to comment, and Smith could not be reached.

"I'm mainly worried about what the guy may have uploaded or downloaded, like kiddie porn," Dinon said. "But I'll probably never know."
--Times staff writer Matthew Waite contributed to this report. Alex Leary can be reached at 727 893-8472 or leary@sptimes.com [Last modified July 4, 2005, 01:43:04]
post comment

DEFCON LJ community & WiFi events [25 Jun 2005|08:16pm]

[ mood | sick ]

Since someone deleted dc_stuff, and some kid already has defcon (who has not posted in their LJ for a year & the contact email rejected); I created the LJ community defcon_defcon for those DEFCON attendees (whether attendees, speakers, Goons, or even Feds) that are on LiveJournal to socialize, discuss DEFCON issues, and plan for the next one.

With that being said, anyone planning on participating in the WarDrive or Wi-Fi Shootout?

post comment

[28 Apr 2005|11:38pm]

how do you find the SSID of a blank/hidden host?
3 comments|post comment

Busted! [24 Apr 2005|01:34am]

[ mood | bored ]

From fark:

St. Petersburg - A veterinarian using a wireless computer at his home on 26th Avenue North Wednesday night called St. Petersburg police.

He realized a man using a laptop computer in a car parked in front of his home, had tapped into his internet service.

"While this person was accessing his computer, little icons appeared on his computer screen, or his monitor and this puzzled him because he did not access any of those areas."

Police say they arrested 40-year-old Benjamin L. Smith III while he was still on-line in front of the veterinarian’s home. Smith is charged with offense against computer use, a felony.

"So what the computer did is basically searched the area to see if there was a signal, found it, and utilized it."

St. Pete Police say it's the first case they can remember like this. Investigators are still trying to figure out what Smith was up to. Was he just looking for free internet access, or was he trying to hack into the victim's personal information, or maybe download something that would have gotten the victim, into trouble.

"He was concerned this guy might be accessing child porn or some other such thing."

A man who operates a computer store showed us how easy it is to access someone else's wireless computer. With the business owner's permission, Raymond Cruz accessed a tavern's computer system in less than a minute.

"I'd get all the details of the network which is kind of scary. Basically you can access anybody's internet very easily."

But Cruz says it's also easy for wireless computer users to protect themselves by turning on the encryption system on their computer.

"It's a little check box, if you put the x, it's very easy. It's called WEP encryption."

But Cruz estimates 80% of wireless users don't use encryption, leaving their computer system open to all sorts of problems.

Cruz says most computers users don't know about encryption, because they don't read their instruction manuals.

3 comments|post comment

[18 Apr 2005|11:42pm]


70mb/s 30mile wireless broadbands. 802.16-2004


Haha, think how hard this will make pinpointing!
3 comments|post comment

MMCX connector [08 Apr 2005|04:32am]

Does anyone know which 802.11x, if any, receivers use the MMCX connection?
I was wondering if the orinoco gold PCMCIA card uses this type of connection or if it uses the SMA connector.

Also does anyone know if connecting a 75 ohm thin coax cable to a thick 50 ohm RG-8 coax cable as an extension would cause any trouble?
5 comments|post comment

[04 Apr 2005|11:20pm]

So i left my linksys usb adaptor somewhere where i cant really get it soon.

the problem here: linksys' program disables windows connection manager. and in order to enable it, you need the usb adaptor.

i uninstalled the linksys program.

any of you know of any small, free wifi connection managers?

or any way to re-enable the connection manager?
2 comments|post comment

off topic, but i need help with mine wireless card [25 Mar 2005|03:48pm]

ok, so my computer is a-ok at home, (im on wireless) but when i turn on my computer from work, or another wireless network, i get this error
Read more...Collapse )
2 comments|post comment

[12 Mar 2005|01:46pm]

do any of you know a program like cirond winc, but free?
3 comments|post comment

[01 Mar 2005|12:45am]

whats the name of that nationwide computer convention the first friday of each month?

its like 2000 or something?
3 comments|post comment

WRT54G, the fun never stops! [19 Feb 2005|04:32pm]

[ mood | accomplished ]

So, myself and some others have been playing more and more with the WRT54G, and starting with Thorn, and now CK3K and myself we have rigged up various setups for it to be wireless, power-wise.

A little thread of comments about it here:

And high-res pics of my setup here:

To do:
Tonight(?) I'm going to work on making the plug system better/more modular. So you can plug the battery into the wrt and the charger without doing anything but move the plug, so hopefully all size M coax plugs. I'll also be putting the battery inside the WRT and see how that performs (Heat? Accidental contact with PCB?), there isn't much room to spare at all in there, so I'm worried about it falling off the top and sitting on the PCB and melting or causing a short or some other bad thing. Not sure how to attach it to the top of the WRT, drill holes and use zip ties? Not sure, but.. this is fun!

10 comments|post comment

[ viewing | most recent entries ]
[ go | earlier ]