
August 18, 2025
What to look for in a business email service (and why it matters)
Key features to help you stay organized, write better emails, and keep your data secure.
Learn moreThe term wardriving was coined by Peter Shipley, a computer security consultant who created a software that interacts with global positioning systems (GSP). Wardriving is a method of hacking that can allow unauthorized users to gain access to a Wi-Fi network. Once inside the network, hackers can access the computers and devices that are connected to the network, install malware, and steal information such as private files or credit card information. It’s important to take steps to protect your home network against potential wardriving attacks to keep your personal data safe.
Wardriving is a hacking method in which a hacker uses hardware and software to find and gain access to unsecure Wi-Fi networks. Hackers are able to gain access to unsecure networks by decrypting the wireless router or cracking passwords using software. Then, the hacker can record these network locations in a process called point mapping and can share this unauthorized information with websites and third-party apps.
While wardriving involves driving around an area in a vehicle to locate vulnerable networks, similar processes can occur on foot or on bike. The hacking process is the same, but the term may vary based on the hacker’s mode of transportation (warbiking, warjogging, warrailing, warwalking, etc.).
Stay safer online with one easy-to-use app1
1Microsoft 365 Personal or Family subscription required; app available as separate download
There are both software and hardware components required for wardriving (and warbiking, warjogging, or warwalking). Attackers must utilize a combination of tools to execute a wardriving attack.
There are numerous software applications that a hacker might use to help crack passwords and decrypt network routers, including packet sniffers, signal strength testers, and traffic analyzers. Since wardriving happens on the move, wardriving software is typically run on a laptop computer or a mobile device. After data has been collected, an attacker may share the information they’ve gathered on public platforms or map software.
A wardriving attack can be completed with generic hardware such as Raspberry Pi—a popular single-board computer—that has the ability to connect to GPS devices.
An antenna attached to a moving vehicle helps the hacker detect vulnerable networks running on 2.4 GHz radio frequency. Most antennas, including omnidirectional antennas, can detect networks from miles away.
Hackers can also use Bluetooth to detect vulnerable wireless networks, since Bluetooth also operates on 2.4 GHz radio frequency. Bluetooth wardriving allows hackers to collect data shared from unsecure devices.
Wardriving falls in a legal gray area—there are no laws specifically prohibiting collecting data from wireless networks or generating network maps but accessing private or corporate networks can veer into criminal territory.
A wardriving attack can leave any device connected to your home Wi-Fi network vulnerable to data theft, which is why it’s essential to take steps to secure your home wireless network against attackers. Get in the habit of taking the following precautions to keep your devices and data safe:
By keeping your network security updated and taking basic safety precautions, you can protect your home wireless against becoming a target of a wardriving attack. From identity theft to financial loss, wardriving attacks can have harsh results for those that leave themselves and their personable data vulnerable to hackers.
The powerful productivity apps and creativity tools in Microsoft 365 just got better. Work, play, and create better than ever before with the apps you love and Microsoft Copilot by your side.
Try for free