Speak to a Security Expert

Wireless Attack & Penetration test will
> Identify vulnerabilities,
> Evaluate the risk of unauthorised access to your network, and
> Offer advice for hardening and remediation

Wireless Network Penetration Testing






Wireless Security Testing Approach

Wireless Discovery

ValueMentor will identify and inventory wireless access points whose signal can be received at the Targeted Locations, whether physically located at or nearby the Targeted Locations.

Additionally, the wireless signal leakage will be mapped to determine the amount of bleed over outside the Targeted Locations.

Wireless Penetration Testing

ValueMentor will attempt to establish unauthorized connections with those access points physically located at the Targeted Locations.

  • ValueMentor will first capture information from existing communications, such as private keys, SSIDs, usernames and passwords, and encryption schemes deployed.
  • Next, ValueMentor will use the gathered information to attempt to establish an unauthorized wireless connection with the Targeted Locations access points, hijack an existing connection, break the encryption scheme in use, and/or impersonate a valid user.
  • Additionally, ValueMentor will attempt to assess the security of wireless client devices accessing the Targeted Locations wireless network by attempting man-in-the-middle attacks, false Customer access points, and other scenarios to ascertain the security of wireless client devices.

Rogue Detection

ValueMentor will walk through the client premises

  • to identify and locate rogue access points and ad-hoc networks (those access points and networks not authorized by the client) and
  • then attempts to determine if they are connected to the client network

Wireless Controller / AP Security Review

A security configurations review of the Wireless controllers will help you identify configuration weaknesses such as

  • Wireless LAN segmentation
  • Security controls
  • Configuration against common threats

Wireless Network Penetration Test Report

Wireless Network Security Assessment reports are subject to the specific assessment being performed. However, in general these reports provide insights about

  • Strengths and weaknesses of the wireless network infrastructure
  • Security Configuration review report of the Wireless Controller / AP
  • Proof of concept section for any exploited networks
  • Recommendations on how to improve the wireless security within the client network.

Application Security Assessments

Web applications play a key role in today’s business and connect organizations with its customers, partners and suppliers. For most organizations, web applications connect to most critical information assets within in the organizations. This…

Mobile Application Security & Risk Analysis

Mobile applications are increasing in numbers every day. Today more mobile phones / tablets accesses web applications than PCs. Increase in mobile applications means, application vulnerabilities and thus security incidents. Many mobile applications…

Wireless Security Assessment Service

A wireless network offers a convenient way for your employees and partners to connect to the network. An insecure wireless network will enable an attacker to easily access your networks. The use of weak wireless protocols, configuration mistakes…