NetHunter Wardriving
Table of Contents
Wardriving
NetHunter’s Wardriving panel merges your Android device’s GPS and external radios into Kismet, producing a real-time, geotagged RF heatmap. Use its toggles to feed Kismet live location and capture streams from Wi-Fi, Bluetooth, RTL-SDR and vulnerability scanners.
Options
GPS
Android GPS Provider
Starts the Android GPS Publisher service on UDP port 10110, streaming NMEA sentences to Kismet.gpsd in chroot
Runsgpsd
inside the Kali chroot (TCP 2947) and enables Kismet’s--use-gpsd-gps
support.
Kismet
Interfaces
Wireless interface
The Wi-Fi device that must already be in monitor-mode (e.g.wlan0
).
Enable monitor mode viaairmon-ng start wlan0
or Custom Commands ▶ Start wlan0 in Monitor Mode.Bluetooth interface
The HCI device for BLE/classic sniffing (e.g.hci0
).
Additional options
RTL SDR
Activates the generic RTL-SDR plugin for broad-spectrum scanning.RTL AMR
Decodes Automatic Meter Reading telemetry from utility meters.RTL ADSB
Decodes ADS-B aircraft broadcasts.
Attacks
- Mousejack
Captures unencrypted HID frames from vulnerable 2.4 GHz mice and keyboards.
Workflow
- (Optional, if GPS desired) Enable Android GPS Provider then enable gpsd in chroot (
--use-gpsd-gps
) - Put your Wi-Fi radio into monitor mode and set Wireless interface
- Optional: Select Bluetooth interface
- Optional: Enable RTL-SDR options: broad spectrum, AMR or ADSB
- Optional: Enable Mousejack attack
- Tap Launch Kismet and to start
kismet_server
with all selected sources. Wardriving app will wait for the first GPS fix and successful Kismet launch before opening the browser UI.
Logging
Status and debug messages appear in the logging area at the bottom of the panel.
Updated on: 2025-May-30
Author:
ghostbuster