Model Number: Enthusiast Kit ($399 MSRP)
Airtouch Security Systems’
war driving kits enable just about anyone to utilize a laptop to perform security
auditing on wireless LANs. All kits currently include sniffing software, 802.11b
radio NIC, and antenna. Airtouch sells different versions of the kit with varying
antennas types. For example, the Enthusiast Kit that I tested came equipped
with a medium power, car-mountable, omni-directional antenna. Other versions
include the Beginner Kit ($299), which comes with a lower power omni-directional
antenna, and the Pro Kit ($499), that includes a higher power, car-mountable
- Easy to install and use
- Relatively low price
- Limited analysis features
- Limited radio NIC support
The war driving Kit is definitely easy to setup and use. All you need is a
laptop and the contents of the Kit, and you’re ready to get started. Airtouch
includes NetStumbler software with
very clear installation instructions. An Avaya radio NIC was in the Kit, and
my laptop (running Windows XP) recognized and installed the card without any
problems. If the software drivers that came with the card do not work with your
PC, then you’ll need to download the latest drivers from the radio NIC manufacturer’s
Web site. All you have to do after installing the NIC and NetStumbler is to
attach the antenna, and you’re ready to go war driving.
The price of the war driving Kit is relatively low as compared to other analyzers.
You also get 30 days of toll free technical support with the Kit, so the price
isn’t too bad for non-technical people who will likely need the support. With
the Kit, however, you’re really only paying for the hardware (radio NIC and
If you’re technically literate, then you can download
and install a free copy of NetStumbler and just purchase a compatible NIC (or
use one you may already have). Netstumber is "BeggarWare," and you
can only use it for personal use and not redistribute it without the author’s
(Marius Milner) express permission. If you
like the software, then Marius asks you to send him how every much money you
feel the software is worth.
A point to consider is that Airtouch doesn’t currently provide standard analysis
software. NetStumbler alone is a simple, handy option for scanning wireless
LANs. It captures wireless LAN information, such as SSID (service set identifier),
access point channel and MAC addresses. It also includes a nice graph showing
signal and noise power.
You might receive sniffing software other than NetStumbler, though, in Airtouch’s
Kit. In fact, you might also receive some other vendor’s radio NIC. Airtouch
only guarantees that you’ll receive everything you need (minus the laptop) to
go war driving.
NetStumbler supports any radio NIC having the Hermes chipset (e.g., Orinoco
and Avaya). As a result, you’re limited in the choice of radio NICs. This is
a common problem with 802.11 analyzers, mainly because the test tool vendors
have difficulties supporting a wide range of card drivers. In the future, Airtouch
may introduce additional sniffing software in their kits that will interface
with a wider variety of radio NICs.
War Driving Experience
After installing NetStumbler, the radio NIC, and the antenna, my son, Eric,
and I hit the road. I recommend that you take someone with you before war driving.
You’ll need an additional person to manage the laptop and aim the antenna.
We kept the antenna inside the car, which limited range due to the car’s attenuation.
Neither one of us wanted to look too conspicuous by mounting the antenna on
top of the car. By having the antenna inside the car, you’ll experience about
3 dB of attenuation compared to mounting the antenna outside. This cuts the
signal power in half, but that didn’t seem to matter. We found more than enough
access points with this configuration.
We started by driving through the commercial areas around my office and were
really amazed by the number of wireless LANs we found in retail stores, office
complexes, schools and hotels. It was a thrill each time NetStumbler would beep,
indicating that it found another access point.
Most of the access points we found were broadcasting SSIDs (service set identifiers)
with no WEP (wired equivalent privacy) enabled. That was quite a surprise. We
could also see what channel they were operating on and all of the associated
MAC (medium access control) addresses. As a result, the networks were open enough
for us to interface with and possibly utilize associated network resources.
Of course, we didn’t do that!
The war driving experience was actually pretty fun. Of course the true utility
of a tool such as the War Driving Kit is to test your own network. We tried
analyzing the wireless LAN in my office, but didn’t detect anything except for
some radio waves. The Kit wasn’t able to break through the extra security that
we have in place. You can use the Kit for testing your wireless LAN, but like
others you’ll probably jump in your car soon after receiving the Kit and drive
all over the city in which you live.
The War Driving Kit is an easy to use, low cost tool for equipping yourself
for war driving. Whether you’re going to cruise around and find access points
for fun or use it to check the hardening of your own wireless LAN, the Kit does
a good job. Keep in mind that this is just one instrument, however, and its
limited analysis features may keep you from fully assessing the security of
your network. You may still need a higher end analysis tool such as AiroPeek
Jim Geier provides independent consulting services to companies
developing and deploying wireless network solutions. He is the author of the
book, Wireless LANs
(SAMs, 2001), and regularly instructs workshops on wireless LANs.
Join him for discussions as he answers questions in the 802.11 Planet Forums.