Wireless networks are everywhere. Employing a wireless solution can offer greater flexibility, but it comes with greater potential for attack as it expands your organisation’s logical perimeter. From rogue access points to weak encryption algorithms, threats to wireless networks are unique and the risks can be significant.A Wireless Penetration test is an authorised hacking attempt, which is designed to detect and exploit vulnerabilities in security controls employed by a number of wireless technologies and standards, misconfigured access points, and weak security protocols.
Methodology
- Identifying Wi-Fi networks
- wireless fingerprinting
- Scanning
- Detecting information leakage and signal leakage
- encryption cracking
- WEP Cracking
- wireless sniffing and session hijacking
- evading WLAN access control measures
- Identifying legitimate users’ identities and credentials
- WPA/WPA2 Cracking
- Reporting
Benefits
- Ensure Compliance with PCI DSS and other security standards.
- Detect vulnerabilities, misconfigured wireless devices, and rogue access points.
- Reduce the risk and legal ramifications of a business breach.
- Harden the wireless access path to your internal network.
- Get independent security verification – of encryption and authentication policies – for devices interacting with your wireless network.
- Prevent unauthorised use of your wireless network as a pivot for cyber-attacks, which may be traced back to your organisation.
- Provide management with a proof of exploit, which outlines the assets that an attack can compromise; such as, compromising critical data or gaining administrative level rights over routers and switches.
Attacks
- Open Authentication Attack
- Shared Key authentication attack
- Fragmentation Attack
- Korex Chop Chop attack
- MAC Address Spoofing Attack
- Disassociation and Deauthentication Attacks
- Shared Key Authentication Attacks
- Known Plaintext Attack
- Reaction Attack
- Message Modification Attack
- Inductive Attack
- Reuse IV Attack
- WEP Key Attacks
- FMS Attack
- Dictionary Attack on LEAP
- Rouge APs
- Ad-Hoc Networking Issues
- Temporal Key Integrity Protocol attack
- Krack Attack
- WPA/WPA2 Cracking
- PMKID Attack
For Datasheet Please Click here: