Wireless network penetration testing

Providing the security assurances you need when it comes to your onsite wireless networks

Why does your wireless network need testing?

Organizations will often operate several distinct Wi-Fi networks from a single site. A typical setup may include a staff network, a guest network and potentially a dedicated network for connected IoT devices such as printers.

The primary risk relating to Wi-Fi networks is that a compromised network may be used as an initial foothold from which to attack the rest of the organization. Certain Wi-Fi attacks can also be used to steal user credentials.

While Wi-Fi attacks require physical proximity to the target, this is typically not a barrier for a dedicated attacker. This is because Wi-Fi signals often extend beyond the physical perimeter of a site and specialist equipment can provide attackers with a much greater signal range.

Find out more about Pentest

Find out more about Pentest, the support we offer and
the reasons clients choose us.

What we review

Our wireless testing is delivered onsite and is tailored to your exact requirement. Pentest consultants can evaluate the following areas of your network security:

Rogue access points

Insecure router configuration

Wi-Fi Protected Setup (WPS) weaknesses

Insecure wireless encryption

Improper network segregation

Susceptibility to wireless attacks such as Evil Twin attacks

It is impossible to exhaustively cover all possible security vulnerabilities that may affect a network. Consequently, the aim of our test methodology is to act as a baseline, with additional tests and checks being performed when necessary.

Our wireless test process

Every wireless network penetration test goes through a rigorous process to ensure you get the best possible results. Below we outline the key stages our testing goes through:

1. Scoping

Your dedicated account manager (AM) will work closely with you to understand your business, the networks under review & the desired outcomes. The AM will then work with the assigned Pentest consultants & your stakeholders to ensure testing meets your exact needs.

2. Proposal

A bespoke proposal of work will be drawn up based on your requirements, our experience & our consultant’s expertize. This proposal will outline our recommended test approach, prerequisites needed & the time required to investigate the targets.

3. Testing

Testing will commence on the agreed date and our consultants will communicate with you throughout the test, to your set requirements. All testing is conducted manually and our consultants will look to identify as many issues as possible in the time allotted.

4. Reporting

A comprehensive, quality assured report of our findings will be delivered following the test. Our reports can be tailored to your needs, providing both a technical and managerial overview of findings, as well as our detailed remediation advice.

5. Post-test support

Our job doesn’t finish on the delivery of a report, your test consultant will be available after the test to explain any aspect of the report, as well as provide remediation support to internal teams and/or external suppliers.

6. Evidence of testing

Many of our clients need to supply evidence of testing for security assurance purposes. We can supply additional documentation which will provide these assurances to your internal and/or external stakeholders.

Why choose Pentest?

Our test process isn’t the only reason clients choose to work with us. Find out more about Pentest, our ethos and the support we offer our clients.

Contact us

Want to find out more about our wireless network penetration testing service? Our team are on hand to provide you with the information you need. Please fill out the form below and one of our team will be in touch shortly.