Our team considers wireless networks to be a weak point in security networks. Our experience shows that wireless networks can actually be implemented with very strong security in mind, however failures can still occur regardless of the technology, organization or business concerned
Comprehensive wireless security assessments include analysis of the network structure and configuration, detecting weak security passwords and algorithms, and exploration of the risks related to the so called “evil twin” attack. (In an evil twin attack, the attacker places an access point in the corporate network that at first glance seems to be legitimate, and yet enables eavesdropping of all the traffic it is intended to stalk.)
Our Wireless Security Assessment services measure the security of your wireless infrastructure and provide you with a road map to ensure the integrity and availability of information and resources. This assessment is complete in three phases. Each phase provides the ethical hacking team with information that is used in the next.
During the first phase, Map and Identify Active Wireless Networks, the ethical hacking team will determine your network's vulnerability to an attacker with radio access to the wireless network space. The ethical hacking team will attempt to detect the 802.11 wireless networks in place (including any ad-hoc networks identified), determine the locations and ranges of the wireless networks, evaluate the range of the wireless access area, determine network configuration information, and probe points of entry for identifying system information or access parameters.
In the second phase of the engagement, Assess Wireless Implementation for Vulnerabilities, our group will pose as someone with normal user access and evaluate the security measures taken to secure infrastructure, including the following ESSID, the use and strength of WEP encryption, network segmentation, and access control devices.
During the last phase of the assessment, Exploit Vulnerabilities and Access Other Networks, the team will try to use the previously discovered vulnerabilities to obtain access to other network segments. If the team is successful, they will test different methods to exploit that access. This phase will determine which network segments and systems the wireless network infrastructure can access, the security controls that separate the wireless network from other network segments and if the wireless network can be used as a launching point to attack other systems.
In an assessment the range on which network traffic eavesdropping can be performed is also evaluated. Depending on client needs, physical security aspects can be investigated as well with coverage extending to both the networks most at risk and inspection of the locations of access points.
Each test is performed to emulate potential threats and to find options to mitigate them. As a result, our clients get a comprehensive report describing the assessment in detail including executive summary, detailed finding with risk level and mitigating controls and recommendations.
eam can perform during the vulnerability assessment. Any High-Risk vulnerabilities/risks identified during the assessment will be immediately communicated to you. After the testing has been completed, our Group will provide your organization with a formal report that:
For further information on our WiFi Security Assessment service
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time to worry about a new kind of WMDs – Weapons of Mass Disruption.
Intellectuals solve problems; geniuses prevent them.
People who deal with bits should expect to get bitten.
Education is the process of learning more and more about less and less until one knows everything about nothing and is entitled to call oneself 'Doctor'.
Programming can be fun, so can cryptography; however they should not be combined.
Kreitzberg and Shneiderman
Computers don't introduce order anywhere as much as they expose opportunities.
Alan J. Perlis