My Ex-WiFi uses packet sniffing to construct a portrait of the individuals in an area. This was made for Paolo Pedercini’s Internet Resistance class at CMU.



Upon discovery by the program, the old WiFi networks are broadcasted–allowing any device within the vicinity to see the network names on its WiFi list. The result is a graveyard of bygone WiFi networks; “ghosts” of access points that reveal so much yet so little about people’s lives, which can only be seen but never joined. 


'mukkuru', 'Apple Store', 'TroyBoy', and 'IBMVISITOR' are the fake networks


In this project I learned that our devices retain more information about us than we are aware of.  On the day of my presentation, a local artist who was visiting my class was surprised to find the Wifi network of a coffee shop in Europe she frequently visited with her ex-girlfriend.  I was surprised to discover that my professor used to have a network named 'cuddledeath'.



This project makes use of the packet sniffing and beacon injection functionalities available in the aircrack-ng suite. There are three separate bash scripts:,, and

Sample output from network monitoring

Sample output from network monitoring runs the and scripts. initiates network monitoring and saves the output (above) into a .csv file. This file is continually updated as stations enter and leave the network. parses this csv file, paying attention to only the entries in the “Probes” column as those entries represent networks previously joined by the device. After extracting the names of the entries, the script turns them into fake Access Points by injecting them into the network–this is done by spoofing MAC Addresses for each entry. To avoid redundancies, an entry is only added if it does not already exist in the Wifi network list.