Raspberry Pi Technology
Raspberry Pi Wardriving Rig


Dave Bryan, who is a security penetration tester (and president of the Hack Factory), bought a Raspberry Pi a few weeks back and decided to use it to wardrive around Minneapolis. He took a RasPi Model B and added a 32-gig SD card, a ReaTek wifi adapter, a mag mount wifi antenna, a GPS receiver, and a 12,000 mAh USB battery pack.

From that I did a little bit of driving and biking with this tool kit, passively looking for and logging networks. I could have easily used my NinjaTel phone (and will attempt this in the future), but I wanted something that I didn’t have to mess with to much and would have a long battery life to “power all the things”.

From this I found that out of 6,164 APs identified, that only %5 had WEP configured (which is flawed). That is a total of 327 APs that still had WEP enabled. Not to bad as a basic health check. Of course more data would always be better.

18 thoughts on “Raspberry Pi Wardriving Rig

  1. Really? That many without encryption? One would think that as simple as it is to enable WEP on virtually any wireless access point or router that more people would take the time.

  2. I think the point is that 5% did STILL have WEP configured. WEP is flawed and easily hacked with tools one can download making it pretty easy for a script kiddie to defeat.

  3. I have 3 hotspots, one of which is configured with wep – for computers that can’t connect to wpa networks. There are still a few of them out there. But the wep network has a speed cap of 5 kB/s. If people want to hack it, they are welcome to.

Comments are closed.

My interests include writing, electronics, RPGs, scifi, hackers & hackerspaces, 3D printing, building sets & toys. @johnbaichtal nerdage.net

View more articles by John Baichtal