Wireless Penetration Testing

Our advanced penetration testing improves your security and keeps you in control.

What is Wireless Penetration Testing?

Extending the scope of your testing to include any wireless network is crucial. Hackers generally regard wireless as an ideal route into your systems.

The convenience and accessibility of wireless technology makes it an integral part of business today. No cords or cables, just radio waves between the device of your choice and the target data.

Wireless technology is unfortunately yet another attack vector which can be compromised and used for a malicious attack if not properly secured.

Is your corporate network properly segmented from the public access network you give to guests and clients?

Our Approach to Web Application Pen Testing

Our wireless security assessments encompass all aspects of wireless infrastructure deployments and aims to uncover weaknesses that an attacker may leverage to remotely gain a foothold into the internal network.

With the popularity of Bring Your Own Device to the workplace initiatives, WIFI networks have become the primary method by which end-user devices access organisational data. It is therefore more important than ever to ensure the deployment and configuration of these networks is as secure as possible.

Cognisys’ multi-faceted approach to wireless security testing assesses wireless deployments against security best practices and can help ensure organisations adequately protect critical assets, whilst offering employees, contractors and guests the key flexibility that WIFI offers.

Results of the assessment are documented in a simple, easily digestible format with information on the latestupcoming technologies. Cognisys consultants are also available for further queries and advice post engagement.

What Web Application Penetration Testing Involves

Overview

The engagement is tailored to the client’s particular topology and configuration and covers the following aspects:

  • Wireless survey of the premises
  • Identification of rogue/unauthorised wireless networks
  • Analysis of protocols and cryptography in use
  • Suitability review of authentication schema
  • Wireless radio configuration review
  • Network segregation testing
  • Analysis of wireless client protection mechanisms
  • Pre-Shared Key strength analysis including cracking

Assessment

The assessment commences, utilising manual and automated techniques

Reporting

The assessment is documented in a simple, easily digestible, format.

Let’s Work Together to Create Your Perfect Test.

Let’s Make Things Happen

Fill the form in and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements –

“It was obvious, very quickly, that the Cognisys team knew exactly what they were doing. The speed that they uncovered some major issues justified our selection of them. I’d be more than happy to recommend them.”

Dan Mitchell

Head of IT – Clarion Solicitors

Alex Martin

Cyber Security Expert
Thank you for your message. We will be in contact soon.
There was an error trying to send your message. Please try again later.

By submitting my data I agree to be contacted