The Wireless Network Vulnerability Assessment is designed to uncover weaknesses in your security environment that you did not know existed, pinpointing the minor gaps in technological defenses that could lead to a major compromise of your networks and systems, reputation damage, or even a fundamental threat to your way of doing business.
CIPHERTECHS’ WIRELESS NETWORK VULNERABILITY ASSESSMENT
During a Wireless Network Vulnerability Assessment, audit engineers assume the role of an external party and an authorized internal party attempting to gain unauthorized access to restricted information and network segments through authorized and unauthorized access to the wireless network.
This assessment is performed at client locations with CipherTechs laptops, access points, and scanners.
COMPONENTS OF ASSESSMENT
The wireless network security assessment generally consists of several components:
- Reconnaissance of the 802.11 networks from inside the client’s facility
- Discovery of any rogue access points or ad-hoc systems and evaluation of their security configuration for weaknesses
- Evaluation of legitimate access points with respect to broadcast strength, encryption and authentication
- Evaluation and assessment of layer three configuration parameters used within the wireless network
- Testing of the capability to gain access to the wireless network, in particular the administrative component of the access point, and if successful, determination of what further access could be obtained
- Evaluation of infrastructure support provided elsewhere on the wireless network to include default gateways, DNS servers, DHCP servers, which may be identified in accessing the default network
- Testing of the capability to gain access from within a guest wireless to the internal client network