Wireless Security Testing
Using our well-honed wireless security testing methodology, we focus on four core areas of service delivery to ensure an appropriate level of testing is undertaken:
Environment Enumeration
Verification of target network
Target mapping
Identification (SSIDs, MAC addressing)
Authentication and Ciphers
Channels and Standards
Access Points and Repeaters
Authentication
Bypassing Authentication
User Enumeration
Brute-force Credential Attacks
Configuration Management
Antenna Types
Default SSIDs
Weak Access Point Credentials
Client-side Configuration Testing
Bypass Management Attack Vectors
MAC Filtering
Fake Wireless Access points
Man in The Middle
Network Sniffing
Password Extraction
Bluetooth
Secure Pairing
Man In the Middle Weakness
Relay and Replay
Exposed Services and application layer issues.
Privacy and tracking concerns
Hardware weaknesses
RFID/NFC
Cloning
Unauthorised reading/writing and self-provisioning
Replay and relay attacks.
Device reader hardware assessment.
Compromise assessment.