Wireless Security Testing

Using our well-honed wireless security testing methodology, we focus on four core areas of service delivery to ensure an appropriate level of testing is undertaken:

  • Environment Enumeration

  • Verification of target network

  • Target mapping

  • Identification (SSIDs, MAC addressing)

  • Authentication and Ciphers

  • Channels and Standards

  • Access Points and Repeaters

  • Authentication

  • Bypassing Authentication

  • User Enumeration

  • Brute-force Credential Attacks

  • Configuration Management

  • Antenna Types

  • Default SSIDs

  • Weak Access Point Credentials

  • Client-side Configuration Testing

  • Bypass Management Attack Vectors

  • MAC Filtering

  • Fake Wireless Access points

  • Man in The Middle

  • Network Sniffing

  • Password Extraction

  • Bluetooth

  • Secure Pairing

  • Man In the Middle Weakness

  • Relay and Replay

  • Exposed Services and application layer issues.

  • Privacy and tracking concerns

  • Hardware weaknesses

  • RFID/NFC

  • Cloning

  • Unauthorised reading/writing and self-provisioning

  • Replay and relay attacks.

  • Device reader hardware assessment.

  • Compromise assessment.