<P> Warbiking or warcycling is similar to wardriving, but is done from a moving bicycle or motorcycle . This practice is sometimes facilitated by mounting a Wi - Fi enabled device on the vehicle . </P> <P> Warwalking, or warjogging, is similar to wardriving, but is done on foot rather than from a moving vehicle . The disadvantages of this method are slower speed of travel (but leading to discovery of more infrequently discovered networks) and the absence of a convenient computing environment . Consequently, handheld devices such as pocket computers, which can perform such tasks while users are walking or standing, have dominated this practice . Technology advances and developments in the early 2000s expanded the extent of this practice . Advances include computers with integrated Wi - Fi, rather than CompactFlash (CF) or PC Card (PCMCIA) add - in cards in computers such as Dell Axim, Compaq iPAQ and Toshiba pocket computers starting in 2002 . More recently, the active Nintendo DS and Sony PSP enthusiast communities gained Wi - Fi abilities on these devices . Further, many newer smartphones integrate Wi - Fi and Global Positioning System (GPS). </P> <P> Warrailing, or Wartraining, is similar to wardriving, but is done on a train or tram rather than from a slower more controllable vehicle . The disadvantages of this method are higher speed of travel (resulting in less discovery of more infrequently discovered networks) and often limited to major roads with a higher traffic . </P> <P> Warkitting is a combination of wardriving and rootkitting . In a warkitting attack, a hacker replaces the firmware of an attacked router . This allows them to control all traffic for the victim, and could even permit them to disable TLS by replacing HTML content as it is being downloaded . Warkitting was identified by Tsow, Jakobsson, Yang, and Wetzel in 2006 . Their discovery indicated that 10% of the wireless routers were susceptible to WAPjacking (malicious configuring of the firmware settings, but making no modification on the firmware itself) and 4.4% of wireless routers were vulnerable to WAPkitting (subverting the router firmware). Their analysis showed that the volume of credential theft possible through Warkitting exceeded the estimates of credential theft due to phishing . </P>

Passive wireless discovery through wardriving is in itself an illegal activity