What we do

We’ll use the same methods as hackers would to test the strength of your wireless security and then highlight the risks to you. We’ll also check for “rogue access points”, which could have been unwittingly installed by staff to open your network to the outside world.

We use a variety of techniques to find entry points to your wireless network, then attack the wireless infrastructure to gain full access.

Access Point Enumeration

Our goal is to enter your trusted network via your access points. Before we attack them, we need to know what they are, where they are and if they leak any valuable information for us to exploit in our simulated attack.

Vulnerability Exploitation

Having discovered viable attack vectors, we look for vulnerabilities that could be exploited to gain unauthorised access to the target systems e.g.:

  • Focused attacks against connected wireless clients
  • Brute forcing wireless keys and the decryption of wireless traffic
  • Attempts to gain access to the internal networks from segregated networks, such as guest networks.


More articles

The latest from the security bureau