Wireless Security Management

Wireless Security

Wireless security management is the prevention of unauthorized access or damage to computers using wireless networks, Wireless Penetration Tests are strategic and isolated attacks against the client’s systems, testers will simulate a hacker and attempt to identify, exploit, and further penetrate weaknesses within wireless systems.

Our ultimate goal is to gain as much unrestricted access to sensitive information as possible, including administrative-level rights, fully enable access over routers and switches, and access to sensitive data. Wireless Penetration Tests will evaluate risk related to potential access of your wireless network, identify access points and devices from various areas located outside and within the facilities. A concept called “war-driving” allows attackers to use automobiles to collect sensitive information from far distances and attack key systems. Simulations utilizing war-driving, as well as performing an onsite Internal Attack and Penetration Test if the wireless network is breached, will be conducted.

Types of procedures:

•­   wireless security are Wired Equivalent Privacy (WEP)
•­   Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) 802.11,
•­   Bluetooth
•­   RF
•­   Can conduct detailed spectrum analysis

Our Action Plan:

1. Reconnaissance
2. Attack and penetrate
3. Client-Side attacks
4. Entering the network
5. Vulnerability assessment
6. Exploitation and data capture