Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Wardriving at Delhi Updated –The OPEN, WEP & WPA faces of Delhi

I got an overwhelming response to my Wardriving at Delhi project and have got a lot of emails regarding the same. I am so thrilled that so many people want to contribute to the project. Inspired by your feedback, I am here by producing here an update to my mapping project. This time I went Via Saket to Gurgaon and as usual I got a lot of access points which were OPEN with no security, WEP secured vulnerable access points & WPA/WPA PSK2 secured points.
 
As usual, I used -
  • Kismet
  • Moocherhunter
  • Aircrack
  • G-MON & WiGLE
The target is to make a map of Delhi with all the access points  to analyse in layman terms -
  1. The security awareness of people and organizations
  2. The devices they are using
  3. The security mechanisms they are using.
  4. Wifi range analysis of individual device.
Well, in all you can find the data from below links -
  • Hotspot details / BSSID (See if you are on the list) =))
  • Google Maps KML Data (See it in Google Maps)
If you are interested in contributing to the data, please contact me at admin<at>theprohack.com . You can also read how to Hack Wifi using Backtrack , How to detect if someone is using your WiFi  or how to detect WiFi hotspots . If you are having an Android, you can also read about how to use your Android for Wardriving.

Happy Wardriving.
Thanks for your readership. Be a Pro,Visit Prohack. RD


This post first appeared on Pro Hack, please read the originial post: here

Share the post

Wardriving at Delhi Updated –The OPEN, WEP & WPA faces of Delhi

×

Subscribe to Pro Hack

Get updates delivered right to your inbox!

Thank you for your subscription

×