What we do

We’ll use the same methods as hackers would to test the strength of your wireless security and then highlight the risks to you. We’ll also check for “rogue access points”, which could have been unwittingly installed by staff to open your network to the outside world.

We use a variety of techniques to find entry points to your wireless network, then attack the wireless infrastructure to gain full access.

Access Point Enumeration

Our goal is to enter your trusted network via your access points. Before we attack them, we need to know what they are, where they are and if they leak any valuable information for us to exploit in our simulated attack.

Vulnerability Exploitation

Having discovered viable attack vectors, we look for vulnerabilities that could be exploited to gain unauthorised access to the target systems e.g.:

  • Focused attacks against connected wireless clients
  • Brute forcing wireless keys and the decryption of wireless traffic
  • Attempts to gain access to the internal networks from segregated networks, such as guest networks.


More articles

The latest from the security bureau

We are now Informer

It’s been a busy start to 2020. Behind the scenes, we’ve been enhancing our SaaS platform, rebuilding our website and rebranding to Informer. Since 2014, The Security Bureau has helped our customers identify vulnerabilities in their systems and applications with our penetration testing services. As the security landscape has changed, we’re now taking a SaaS […]

Why financial services need penetration testing in 2020

It’s that time of year again, where we try to shed the festive pounds and look to the year ahead. 2020 promises to be an interesting time for cybersecurity in financial services. Not least because of Brexit and the US presidential election. Here’s our essential cybersecurity in 2020 lowdown.