Wireless Security
Wireless Penetration Testing
Optional Add-Ons
-
Full-Spectrum Site Survey
We use state-of-the-art software defined radios (SDRs) to examine the full frequency spectrum near your facilities. This allows us to provide a comprehensive list of RF devices in or near your facilities, including ones out of reach of traditional wireless monitoring software. Each full-spectrum site survey also includes an 802.11 site survey. -
Post-Breach Impact Assessment
Modern wireless networks are often designed according to strict isolation requirements, in which devices connected to wireless access points do not have direct access to sensitive internal infrastructure due to segmentation. Our Post-Breach Impact Assessments are designed to gauge the broader impact of a wireless perimeter breach by measuring the ease at which an attacker can pivot from wireless subnets to the organization’s internal network. This includes performing tasks such as segmentation testing, evaluating controls such as wireless client isolation (WCI), attempting to compromise wireless control panels, and performing highly targeted internal penetration testing of wireless subnets. We highly recommended this add-on service, as it help further quantify the risks associated with wireless compromise. -
Wireless Client Security Testing
Evaluating an organization’s wireless security posture using direct attacks against wireless networks only provides half the picture. Even when wireless networks themselves can be considered secure, an attacker may still be able to be able to achieve network by pivoting indirectly through client devices compromised using wireless person in the middle (PITM) attacks. Our consultants can attempt to replicate this threat scenario to gauge the resilience of an organization’s client devices against such an attack.
Additional Wireless Security Services
Rogue Device Hunting
Full-Spectrum Rogue Device Hunting (optional):
Network Access Control (NAC) Evaluation
NAC devices are often used to provide an additional layer of protection from wireless intrusions by determining which resources wireless devices can access once they connect to the network. Our consultants can connect to your wireless networks and attempt to evade any NAC appliances deployed to protect them, allowing us to gauge their effectiveness from an attacker’s perspective.
Detection and Incident Response Assessment
Wireless Intrusion Detection (WID) and Wireless Intrusion Prevention (WIP) systems can often be an effective safeguard against wireless compromised when combined with basic wireless security hygiene. However, it is often difficult to know their effectiveness until they are tested by an attacker, at which point it may be too late. Our consultants can perform a matrix of tests of gradually increasing sophistication against WIP / WID systems, allowing us to measure their effectiveness on a sliding scale. This enables us to determine exactly where these systems fall short. In addition, our consultants can evaluate the response times, tactics, techniques, and procedures (TTPs) of the security personnel responding to wireless security alert. This allows us to provide a comprehensive analysis of an organization’s wireless incident response (IR) capabilities that includes an analysis of technology, processes, and personnel.