What we do
We’ll use the same methods as hackers would to test the strength of your wireless security and then highlight the risks to you. We’ll also check for “rogue access points”, which could have been unwittingly installed by staff to open your network to the outside world.
We use a variety of techniques to find entry points to your wireless network, then attack the wireless infrastructure to gain full access.
Access Point Enumeration
Our goal is to enter your trusted network via your access points. Before we attack them, we need to know what they are, where they are and if they leak any valuable information for us to exploit in our simulated attack.
Vulnerability Exploitation
Having discovered viable attack vectors, we look for vulnerabilities that could be exploited to gain unauthorised access to the target systems e.g.:
- Focused attacks against connected wireless clients
- Brute forcing wireless keys and the decryption of wireless traffic
- Attempts to gain access to the internal networks from segregated networks, such as guest networks.
Related
- What’s the difference between a penetration test and a bug bounty? - To stay secure and comply with regulations, businesses must regularly test their assets for vulnerabilities. There are several ways to
- Why financial services need penetration testing in 2020 - It’s that time of year again, where we try to shed the festive pounds and look to the year ahead.
- How to avoid ransomware in financial services - Travelex’s ransomware attack is an all too familiar story. An organization - large or small - falls victim to cybercriminals