posted on Nov, 16 2013 @ 08:12 PM
What you really need to do is a security audit of your wifi. Set up Kismet and sniff yourself, uh so to speak. Kismet sees whatever a spy can see. You
can park on a channel then run wireshark and see all the traffic.
Now as far as tracking goes, you want to see wifi activity when you foolishly think you are not using wifi. If you have a device set up to
automatically connect to various WAPs, you have a homing beacon. The device puts out request to see if there is a Starbucks or whatever out there. You
can be in the middle of nowhere, without a chance of finding any wifi access point, but your devices will still chirp away. Most devices will let you
select if you want this automatic connection. On some phones, this feature is buried pretty deep. There is also that "HP setup" ad hoc that lots of
If the WAP information you have stored is unique, it can be quite a beacon. For instance, if you set up wifi at the Chicken Ranch bordello, then the
person running Kismet knows you frequent the place. I mean how many WAPs would have chickenranch as a SSID. [Actually, I don't know if they have
wifi, but you get the point.]
From what I have seen, metadata is not encrypted on wifi, so your MAC is not hidden.
Not so critical for mobile users, but a lot of WAPs will reveal what devices you have on your LAN since all the devices will broadcast on occasion.
You can see networked TVs, music players like Sonos, barcode readers, printers, etc. There are ways around this with DDWRT.
Since most people don't practice tradecraft countermeasures for traffic analysis, kismet can sniff to see if anyone is home and using the wifi.
You will need wifi capable of monitor mode to use kismet. This is often confused with promiscuous mode.
Don't confuse Kismet with the inferior Netstumbler.