Wireless Network Systems Penetration Tests

Wireless Network Systems Penetration Tests are strategic and isolated attacks and penetration tests against the client’s wireless systems.


During a Wireless Attack and Penetration, we will take a wireless footprint of the target environment to identify all access points that belong to your organization. More importantly, the encryption types used across the wireless environment are determined at this time. Key targets are selected for attack. If unencrypted networks are observed, clear-text transmissions can be sniffed and reassembled in an attempt to identify user credentials and sensitive information.

Our stuff may initiate several attacks depending on the wireless environment. If weak protocols are discovered, active attacks will be run in an attempt to break the encryption on the affected networks. These attacks can include man in the middle (MitM) attacks, brute force attacks, session hijacking, and mass de-authentication. If your organization's network is found to be using Enterprise authentication, we will perform tests against the wireless clients themselves in order to determine if these devices are being configured properly.

   or Register