This website uses cookies. View our cookie policy
United Kingdom
Select regional store:

  Wireless penetration tests

Wireless capabilities can provide opportunities for attackers to infiltrate an organisation’s secured environment – irrespective of security access controls. Pen testing can help validate weaknesses in the wireless infrastructure.


Wireless: the most vulnerable part of the network infrastructure

The introduction of wireless networks into business environments presents a much easier exploitation path for attackers that are either much more difficult or completely impossible to execute with a standard, wired network.

Wireless networks are everywhere. Employing a wireless solution can offer greater flexibility, but it comes with greater potential for attack as it expands your organisation’s logical perimeter. From rogue access points to weak encryption algorithms, threats to wireless networks are unique and the risks can be significant.

It can be particularly hard to prevent determined attackers from installing a rogue wireless access point on your network without your knowledge. A wireless local area network (WLAN) penetration test can therefore be helpful in determining vulnerable access points in your environment.


The Wi-Fi threat presented by hackers

Hackers use rogue access points as a simple way of gaining access into business systems to capture sensitive data.

Attackers can snoop on Internet traffic using a bogus wireless access point. Fake access points can be set up by configuring a wireless card to act as an access point. They are hard to trace, since they can be shut off instantly. The counterfeit access point may be given the same SSID and BSSID as a nearby Wi-Fi network.

When users log in to the rogue access point, the attacker can intercept user identities and credentials, since it is sent through their equipment. The attacker is also able to connect to other networks.


Internal Wi-Fi threats

Any access points installed or used without the permission of the system administrator should be considered rogue. Here are some examples:

  • Your IT department could misconfigure or accidentally duplicate a wireless network.
  • Employees could bring their own access points to more easily connect mobile devices to the corporate network.

Both scenarios are considered rogue because they do not adopt prescribed security controls. As a consequence, administrators have no visibility into the security of that wireless environment. The risk is increased where employees fail to enable security settings on their own access points, which makes it easier for attackers to intercept network traffic.


What can you expect from a wireless penetration test?

Our wireless network penetration testing service can help detect access points and rogue devices, analyse your configurations and test for vulnerabilities, so that you can implement security controls to prevent an attack


Our testing approach

IT Governance’s approach is closely aligned to the Open Source Security Testing Methodology Manual (OSSTMM) - a methodology to test the operational security of physical locations, workflow, human security testing, physical security testing, wireless security testing, telecommunication security testing, data networks security testing and compliance.


What will my test cover?

  • A range of manual tests conducted by our team of highly skilled penetration testers using a methodology closely aligned with the OSSTMM.
  • A series of wireless surveys of the scoped environment with automated and manual identification of vulnerabilities.
  • Immediate notification of any critical vulnerabilities in order for you to take action fast.
  • A detailed technical report that lists the identified vulnerabilities (ranked in order of significance).
  • A list of recommended countermeasures to address any identified vulnerabilities.
  • An executive summary that explains, in business terms, what the risks mean.



Wireless penetration tests