1-888-PIVOT-POINT | 1-888-748-6876
turn
Select Page
GDPR & Privacy Shield - What They Mean for Your Business

Wireless Penetration Test

Wireless Penetration Test

Wireless (WLAN) Penetration Testing Information

Providing end users with freedom and mobility associated with WLAN is increasingly viewed as a “need to have” creating an additional network security concern. Because radio waves can travel through ceilings, floors, and walls, transmitted data often reaches unintended recipients on different floors/outside the building. Depending upon the specific risks/engagement objectives our WLAN Audit may include:

  • Wireless Security Policy Review
  • Wireless Architecture review (e.g., Access Point Placement and connection to wired LAN)
  • Enumeration of wireless environment including active exploitation of client systems using WLAN as point of ingress
  • Identification of any unauthorized or “rogue” wireless access points within the client‟s network
  • Identification of network bleeds from other WLAN‟s that may pose a bridging risk.
  • Wireless access point configuration review (e.g., SSID‟s, encryption mechanisms,
  • Access Control Review (may include WEP, WPA, 802.1X, ACL‟s, etc.)
  • User Provisioning (e.g., Authentication Credential deployment)
  • Endpoint Security (e.g., configuration & technical controls – firewall, anti-virus, WAP lockdowns, etc.)
Contact A Penetration Testing Expert

WLAN Security Testing is included in annual FDIC auditing for the Financial Industry.

“Do you have any wireless access points? If so, specify the number of Wireless Access Points, security controls in effect and your procedures for detecting rogue access points”