What is Wireless Penetration Testing?
Extending the scope of your testing to include any wireless network is crucial. Hackers generally regard wireless as an ideal route into your systems.
The convenience and accessibility of wireless technology makes it an integral part of business today. No cords or cables, just radio waves between the device of your choice and the target data.
Wireless technology is unfortunately yet another attack vector which can be compromised and used for a malicious attack if not properly secured.
Is your corporate network properly segmented from the public access network you give to guests and clients?
Our Approach to Web Application Pen Testing
Our wireless security assessments encompass all aspects of wireless infrastructure deployments and aims to uncover weaknesses that an attacker may leverage to remotely gain a foothold into the internal network.
With the popularity of Bring Your Own Device to the workplace initiatives, WIFI networks have become the primary method by which end-user devices access organisational data. It is therefore more important than ever to ensure the deployment and configuration of these networks is as secure as possible.
Cognisys’ multi-faceted approach to wireless security testing assesses wireless deployments against security best practices and can help ensure organisations adequately protect critical assets, whilst offering employees, contractors and guests the key flexibility that WIFI offers.
Results of the assessment are documented in a simple, easily digestible format with information on the latestupcoming technologies. Cognisys consultants are also available for further queries and advice post engagement.
What Web Application Penetration Testing Involves
The engagement is tailored to the client’s particular topology and configuration and covers the following aspects:
- Wireless survey of the premises
- Identification of rogue/unauthorised wireless networks
- Analysis of protocols and cryptography in use
- Suitability review of authentication schema
- Wireless radio configuration review
- Network segregation testing
- Analysis of wireless client protection mechanisms
- Pre-Shared Key strength analysis including cracking
The assessment commences, utilising manual and automated techniques
The assessment is documented in a simple, easily digestible, format.