During a Wireless Attack & Penetration Test , Secmentis consultants attack your wireless infrastructure from outside your organization. We will simulate hacker attempts to attack and exploit your wireless access points.
The goal is to identify your vulnerabilities in your wireless access points that could enable an outsider to gain access to your internal network, and ultimately, to sensitive business information.
Our Wireless Penetration Tests are conducted from the perspective of an outsider, or malicious guest. We methodically follow these steps:
Note: Our penetration tests begin only after you have given us explicit and signed authorization.
Secmentis will provide you with a report which includes the following deliverables at the end of our testing:
Which vulnerabilities does our Wireless Penetration Test cover?
“It was great working with the Secmentis team: They quickly understood our requirements and appreciated our tight deadlines, and performed very comprehensive, timely, and useful testing.”
Head of IT, (undisclosed) Internet company
“We were extremely pleased with Secmentis’ work on the penetration testing engagements. The reports created by Secmentis were very helpful and of very high quality.”
Director, (undisclosed) Social Media company
Our Wireless Penetration Tests cover the most critical wireless vulnerabilities.
We perform Wi-Fi attacks against wireless clients to attempt to manipulate WLAN traffic and bypass client isolation.
We exploit Wi-Fi protocol weaknesses to attempt to bypass wireless authentication and gain unauthorized wireless access.
We attempt to identify possible DoS attacks by targeting specific wireless clients or the entire WLAN.
We identify rogue wireless access points within your buildings or offices.
Talk to us today to find out how our experts can best help you