WiGLE (Wireless Geographic Logging Engine)
📝 Overview
What it is: WiGLE is a massive, crowdsourced database and web application used for mapping wireless networks globally. Users (wardrivers) utilize the WiGLE mobile app or other scanning tools to collect data on Wi-Fi networks, Bluetooth devices, and cell towers, which is then uploaded to the central WiGLE.net database to create an interactive, searchable map of the world’s wireless landscape. Target Phase: Reconnaissance (OSINT / Wireless Discovery) Operating System: Web-based (Database/Map) / Android (Official Data Collection App)
⚙️ Core Capabilities
- Global Wireless Mapping: Houses over a billion logged networks. You can search its web interface for a specific network name (SSID) or MAC address (BSSID) to see exactly where in the world it has been physically detected.
- Wardriving Data Collection: The Android app continuously listens to the airwaves as you walk or drive. It logs the SSID, BSSID, encryption type, and exact GPS coordinates of every router or Bluetooth device it hears.
- Trilateration Engine: Because a single router might be detected by dozens of different users driving down different streets, WiGLE uses signal strength and GPS data to mathematically estimate the exact physical location of the access point.
- Security Awareness: By making this data public, it highlights the severe tracking and privacy risks of leaving mobile hotspots on, using easily identifiable SSIDs, or running outdated WEP/WPA encryption.
💻 Common Usage Flow
Note: WiGLE is not a command-line exploitation tool; it is an intelligence database. Here is how it is typically used in the field.
| Action | Description |
|---|---|
| Collection | A pentester runs the WiGLE app on a dedicated Android phone while driving around a target facility to passively log all broadcasting networks and physical boundaries. |
| Extraction | The data is exported from the phone as a .csv or .kml file, which can be imported directly into tools like Google Earth to visualize the target’s wireless bleed. |
| OSINT Search | An investigator searches the WiGLE.net database for a specific BSSID to track the physical location history of a mobile hotspot or a specific connected vehicle. |
⚠️ Notes & Limitations
- Stealth (100% Passive): When collecting data, the WiGLE app never actually connects to or interacts with the networks it sees. It merely listens to the beacon frames that routers constantly broadcast to the public. It is completely undetectable by the target.
- Limitations: The data is only as good as the community’s uploads. If nobody has wardriven down a specific rural road, the networks on that road will not appear in the database.
- OPSEC Warning: If you run a mobile hotspot on your phone named “John’s iPhone,” wardrivers will pick it up wherever you travel. Anyone searching WiGLE for that name can potentially map out your daily commute.
🔗 Links & Resources
🏷️ Tags
WiGLE #Wardriving #OSINT #WirelessSecurity #WiFiHacking #PassiveRecon