Skip to content
Wardriving ekoparty
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.
Ekoparty - Workshop Wardriving 2017.pdf


Here you can find all the data about the Wardriving Workshop from Ekoparty 2017.

Faraday Plugins

The files starting with import_ are all modules to be used with the Faraday Plugin. In order to run them, download and copy to you {faraday_installation}/bin/.

For more info on the Faraday Plugin read the official documentation.

The file will read all packets saved from Open WiFi networks. It will create vulnerabilities for non-encrypted cookies or authorization data. To run:

./fplugin import_dns_pcap wardriving.cap -w eko_wardriving

The file will create a vulnerability with Informational severity and attach a map as evidence. This plugin uses the Android SQLite database as input.

To run first copy the .sqlite in your smartphone to your computer. Then import .sqlite to eko_wardiring using the command:

./fplugin import_wigle /home/lcubo/wigle/wiglewifi.sqlite -w eko_wardriving

The file creates objects in Faraday according to the security settings of the networks found in a PCAP.

Users will be able to see statistics in the Faraday Dashboard including how many networks are using wpa, wpa2, wep and open. It will create vulnerabilities for open and wep. If any of the PCAP files contain a 4way handshake it will also create a vuln with the keys as evidence.

Also, a vulnerability containing the top 10 probe requests found and an XLS file with the vendor frequency will be added.

If you want to load wardriving statistics from a PCAP file to the eko_wardring workspace use the following command:

./fplugin import_wardriving_pcap wardriving.cap -w eko_wardriving
You can’t perform that action at this time.