PCI QSA Company, Certified as ISO 27001 & 9001

Wireless Network Penetration Testing

Wireless Attack & Penetration test will

  • Identify vulnerabilities,
  • Evaluate the risk of unauthorised access to your network,
  • Offer advice for hardening and remediation

Wireless Network Penetration Testing

OWASP

WASC

CREST

PCI

SANS

WIRELESS SECURITY TESTING APPROACH

WIRELESS DISCOVERY

ValueMentor will identify and inventory wireless access points whose signal can be received at the Targeted Locations, whether physically located at or nearby the Targeted Locations.
Additionally, the wireless signal leakage will be mapped to determine the amount of bleed over outside the Targeted Locations.

WIRELESS PENETRATION TESTING

ValueMentor will attempt to establish unauthorized connections with those access points physically located at the Targeted Locations.

  • ValueMentor will first capture information from existing communications, such as private keys, SSIDs, usernames and passwords, and encryption schemes deployed.
  • Next, ValueMentor will use the gathered information to attempt to establish an unauthorized wireless connection with the Targeted Locations access points, hijack an existing connection, break the encryption scheme in use, and/or impersonate a valid user.
  • Additionally, ValueMentor will attempt to assess the security of wireless client devices accessing the Targeted Locations wireless network by attempting man-in-the-middle attacks, false Customer access points, and other scenarios to ascertain the security of wireless client devices.

ROGUE DETECTION

ValueMentor will walk through the client premises

  • To identify and locate rogue access points and ad-hoc networks (those access points and networks not authorized by the client) and
  • Then attempts to determine if they are connected to the client network

WIRELESS CONTROLLER / AP SECURITY REVIEW

A security configurations review of the Wireless controllers will help you identify configuration weaknesses such as

  • Wireless LAN segmentation
  • Security controls
  • Configuration against common threats

WIRELESS NETWORK PENETRATION TEST REPORT

Wireless Network Security Assessment reports are subject to the specific assessment being performed. However, in general these reports provide insights about

  • Strengths and weaknesses of the wireless network infrastructure
  • Security Configuration review report of the Wireless Controller / AP
  • Proof of concept section for any exploited networks
  • Recommendations on how to improve the wireless security within the client network.


Wireless Security Penetration Testing at an Airport

Wireless networks are very common at the airports across the world. The wireless networks at the airports are typically to ...
Read More

Wireless Security Assessment Service

A wireless network offers a convenient way for your employees and partners to connect to the network. An insecure wireless ...
Read More

Mobile Application Security & Risk Analysis

Mobile applications are increasing in numbers every day. Today more mobile phones / tablets accesses web applications than PCs. Increase ...
Read More
Loading...

We’re always standing by and eager to help

Get Help: [email protected]

© 2018 Valuementor. All rights reserved.