What we do

We’ll use the same methods as hackers would to test the strength of your wireless security and then highlight the risks to you. We’ll also check for “rogue access points”, which could have been unwittingly installed by staff to open your network to the outside world.

We use a variety of techniques to find entry points to your wireless network, then attack the wireless infrastructure to gain full access.

Access Point Enumeration

Our goal is to enter your trusted network via your access points. Before we attack them, we need to know what they are, where they are and if they leak any valuable information for us to exploit in our simulated attack.

Vulnerability Exploitation

Having discovered viable attack vectors, we look for vulnerabilities that could be exploited to gain unauthorised access to the target systems e.g.:

  • Focused attacks against connected wireless clients
  • Brute forcing wireless keys and the decryption of wireless traffic
  • Attempts to gain access to the internal networks from segregated networks, such as guest networks.

Related

More articles

The latest from the security bureau

Cyber Threats: What to be aware of in Financial Services

Organisations in the financial industry hold a large amount of sensitive data on their customers which can make them a prime target to cyber criminals. The more sensitive the data the larger the target your organisation can become.

Dealing with Data Retention in The Finance Industry

We’ve been working with financial and insurance companies getting them in-line with the GDPR and we’re answering the most common questions asked are around data retention and the right to be forgotten.