Warflying in a Cessna
This talk demonstrates the technique of 'warflying' to perform large-scale, high-speed aerial collection of Wi-Fi access point data. The researchers utilized mobile devices running WiGLE and laptops with LinSSID to capture BSSID and signal data from a Cessna 182 aircraft. The presentation highlights the effectiveness of aerial signal collection compared to traditional ground-based wardriving and discusses the regulatory and safety constraints of operating such equipment in controlled airspace. The findings provide insights into the range and density of Wi-Fi networks detectable from low-altitude flight.
Aerial Reconnaissance: Scaling Wi-Fi Mapping with Warflying
TLDR: Warflying is a high-speed, aerial evolution of traditional wardriving that uses aircraft to map Wi-Fi networks over massive geographic areas. By mounting mobile devices running WiGLE and laptops with LinSSID in a Cessna 182, researchers demonstrated that aerial collection significantly increases the speed of data acquisition compared to ground-based methods. This technique highlights the massive, often overlooked, footprint of wireless networks and the ease with which they can be mapped from low-altitude flight.
Traditional wardriving is a staple of physical security assessments, but it is inherently limited by traffic, road layouts, and the speed of a vehicle. When you are stuck in gridlock on a Tuesday morning, your ability to map the wireless landscape is effectively zero. The research presented at DEF CON 2024 by Matthew Thomassen and Sean McKeever shifts this perspective from the asphalt to the air, proving that you can collect thousands of BSSIDs in minutes by simply flying over a target area.
The Mechanics of Warflying
At its core, warflying is just wardriving with a better line of sight. The researchers used a Cessna 182, which acts as a large aluminum Faraday cage. To overcome the signal attenuation caused by the airframe, they placed their collection hardware—Android phones running the WiGLE WiFi Wardriving app and a laptop running LinSSID—directly against the aircraft's plexiglass windows.
The setup is deceptively simple. By maintaining a flight path over suburban and urban areas, they were able to capture thousands of unique MAC addresses. The data collection was performed at altitudes ranging from 1,500 to 6,500 feet. While the Wi-Fi Alliance suggests a standard effective range of about 150 feet for many consumer access points, the researchers consistently observed signals from several kilometers away. This is not necessarily because the Wi-Fi hardware is "long-range" in the traditional sense, but because the aerial vantage point removes the signal-blocking obstacles—buildings, trees, and terrain—that plague ground-based scanners.
Data Density and Collection Rates
One of the most striking findings from the research is the sheer volume of data collected. In a single 54-minute flight, they captured nearly 6,000 unique MAC addresses. When comparing this to a ground-based drive over the same 9.8-mile stretch of Woodward Avenue, the results were clear: while ground-based wardriving might capture more total packets due to the proximity and duration of exposure, warflying collects them at a significantly higher rate.
The researchers used Python scripts to process the resulting CSV logs, which included altitude and GPS coordinates. This allowed them to correlate signal strength and visibility with specific flight paths. The "crusty crab" of the Wi-Fi world—a persistent, long-range network—was easily identified across multiple passes. This level of data density allows for a high-level map of an entire city’s wireless infrastructure in the time it takes to grab lunch.
Real-World Implications for Pentesters
For a pentester, this research changes the scope of wireless reconnaissance. If you are tasked with assessing the security of a large campus or a distributed corporate footprint, you no longer need to physically visit every building. A single flight can provide a comprehensive map of all broadcasting SSIDs, their encryption types, and their approximate locations.
This is particularly relevant for identifying "shadow IT" or rogue access points that are not on the official inventory but are broadcasting within the target's perimeter. If a company has a policy against WPA2-Personal or open networks, warflying can identify non-compliant devices across an entire industrial park in minutes. The impact is a massive reduction in the time required for initial reconnaissance, allowing you to focus your efforts on the most vulnerable targets identified during the flight.
Defensive Considerations
Defenders often operate under the assumption that their wireless networks are only visible to those within their immediate physical vicinity. Warflying shatters this assumption. If your access points are broadcasting, they are visible to anyone with a line of sight, regardless of whether they are on the ground or in the air.
To mitigate this, organizations should treat their wireless footprint as a public-facing asset. Ensure that all access points are using modern, secure protocols like WPA3, which is defined in the IEEE 802.11ax standard. Disable SSID broadcasting for internal networks where possible, and implement robust network segmentation so that even if an access point is identified, it does not provide a direct path into the corporate core. Finally, monitor for unauthorized devices using a wireless intrusion prevention system (WIPS) that can detect and alert on rogue signals, even those that might be originating from outside the building.
Aerial reconnaissance is no longer the domain of high-budget intelligence agencies. With a smartphone, a bit of open-source software, and access to a light aircraft, the wireless landscape of an entire city is open for mapping. As a researcher, the next time you are planning a wireless assessment, consider the view from above. The data is there, and it is much easier to collect than you might think.
Target Technologies
Up Next From This Conference

Breaking Secure Web Gateways for Fun and Profit

Listen to the Whispers: Web Timing Attacks That Actually Work

Abusing Windows Hello Without a Severed Hand
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

