Wireless networks are a potential weak point in the corporate perimeter, and an enticing entry point for cybercriminals. If an attacker can gain access to one of your wireless networks (which may include legacy networks you may be unaware of), they can begin to target internal systems. Stay one step ahead by investing in wireless penetration testing – a vital step in keeping your wireless access points, production applications, and data repositories secure.

Who is it for?

Who is it for?

With fewer companies operating on a purely local scale, remote working and flexible office hours remove the geographical barrier to business. To enable such flexible working for your staff, your clients and external partners, the typical solution is a combination of hot-desking and wireless networking.

WiFi networks are not generally afforded the same level of physical network access controls as they are with traditional Ethernet implementations. Furthermore, it is commonplace to provide ‘guest’ or Bring Your Own Device ‘BYOD’ access to wireless networks, which create an increased risk of rogue devices being introduced.

Whilst this provides opportunities for growth, you may also be opening new avenues for compromise by attackers.

How can we help?

How can we help?

We are able to conduct a full review of your wireless network either as a standalone assessment or as part of a larger scale investigation into your infrastructure security posture.

We will often deliver a standalone wireless assessment from a black-box perspective, but we may also combine with an architecture review (thereby utilising a white-box approach), enabling a more thorough analysis.

What we test

What we test

We check the configuration of your wireless technologies, test for rogue access points that may have been installed, and determine whether less secure Wi-Fi networks can provide an avenue to the corporate network. We will also check that wireless security standards around SSIDs, encryption and authentication are all in place. We most commonly find flaws relating to:

  • Encryption protocols – The first line of defence for a wireless network. If an attacker can crack the encryption then they can gain access to the network.
  • Authentication – As an example the PSK acts as a password to authenticate a user to the network. Passwords that are weak, or not stored securely, offer an easy avenue onto the network for an attacker.
  • Segmentation– Weak or absent network segregation can lead to the disclosure of sensitive data, access to (or compromise of) internal systems, and the targeting of internal users.

Want to know more about how wireless penetration testing could benefit your organisation? Get in touch with one of our experts today for more info.

Download our Fact Sheet

Download

Other services

Web Application Penetration Testing

As a direct interface with clients, applications are usually designed with functionality and aesthet...

Wireless Penetration Testing

Wireless Penetration Testing

Wireless networks are a potential weak point in the corporate perimeter, and an enticing entry point...

Mobile Application Security Testing

Many organisations employ a "mobile first" strategy when deploying user-facing applications and APIs...

Infrastructure Penetration Testing

Infrastructure Penetration Testing aims to exploit vulnerabilities in your company's networks and se...

Vulnerability Scanning

Vulnerability Scanning

At Secarma our core services are focused around in-depth manual Penetration Testing and we aim to as...