Wireless Security Assessment

Wireless Security with Wireless Penetration Management

Wireless Penetration/security management is the prevention of unauthorized access or damage to computers using wireless networks, Wireless Penetration Tests are strategic and isolated attacks against the client’s systems, testers will simulate a hacker and attempt to identify, exploit, and further penetrate weaknesses within wireless penetration management systems.

Our ultimate goal is to gain as much unrestricted access to sensitive information as possible, including administrative-level rights, fully enable access over routers and switches, and access to sensitive data. Wireless Penetration Tests will evaluate risk related to potential access of your wireless network, identify access points and devices from various areas located outside and within the facilities. A concept called “war-driving” allows attackers to use automobiles to collect sensitive information from far distances and attack key systems. Simulations utilizing war-driving, as well as performing an onsite Internal Attack and Penetration Test if the wireless network is breached, will be conducted.

Types of procedures:

•­   wireless security are Wired Equivalent Privacy (WEP)
•­   Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) 802.11,
•­   Bluetooth
•­   RF
•­   Can conduct detailed spectrum analysis

Our Action Plan for Wireless Penetration Management:

1. Reconnaissance
2. Attack and penetrate
3. Client-Side attacks
4. Entering the network
5. Vulnerability assessment
6. Exploitation and data capture

Run Your Business. We’ll Protect It.