One of the earliest and most commonly used forms of attack used to target access control is a technique known as war driving. This technique, simply put, is to use a wireless enabled device along with specialized software used to detect or probe wireless networks that have come with in range of the wireless device.
What makes war driving so popular and so effective is the fact that many computer users, both personal and business, have been deploying 802.11 wireless access points for years with little regard for security. The deployment of a wireless network that allows the user to roam has taken precedence over taking measures to secure their access points and devices against potential attack.
In response to this deployment of wireless networks that are misconfigured or insecure, we have a category of attackers that engage in this practice known as war...