{"id":153,"date":"2017-10-05T15:42:05","date_gmt":"2017-10-05T05:42:05","guid":{"rendered":"http:\/\/www.airxperts.net\/?page_id=153"},"modified":"2017-11-10T14:47:56","modified_gmt":"2017-11-10T04:47:56","slug":"wireless-penetration-testing","status":"publish","type":"page","link":"https:\/\/airxperts.net\/index.php\/services\/wireless-coverage\/wireless-penetration-testing\/","title":{"rendered":"Wireless Penetration Testing"},"content":{"rendered":"<h2>What Is It?<\/h2>\n<figure id=\"attachment_442\" aria-describedby=\"caption-attachment-442\" style=\"width: 142px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/11\/Airxperts-Brochure-Wireless-Penetration-Testing.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-442\" src=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/11\/Airxperts-Brochure-Wireless-Penetration-Testing-thumb-213x300.png\" alt=\"\" width=\"142\" height=\"200\" \/><\/a><figcaption id=\"caption-attachment-442\" class=\"wp-caption-text\">Download a PDF version of our Wireless Penetration Testing Brochure<\/figcaption><\/figure>\n<p>A <strong>Wireless Penetration Test<\/strong> is an evaluation of the security of your existing Wi-Fi service.<\/p>\n<p>A penetration test is an in-depth assessment of a system, from the point of view of a would-be attacker. The tester constructs a barrage of tests that seeks to exploit vulnerabilities in the solution or the underlying technology.<\/p>\n<p>The test is conducted by a skilled engineer using special software and\/or hardware.<\/p>\n<p>A penetration test is not necessarily a complete evaluation of the security posture of your solution, however it may be a crucial step in safeguarding your data and your network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-496 size-thumbnail\" src=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/11\/pc-hacked-01-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-hacked-01-150x150.png 150w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-hacked-01-300x300.png 300w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-hacked-01-100x100.png 100w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-hacked-01.png 354w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><em>Note: If you require a comprehensive evaluation of your entire solution, including from a performance and requirements perspective, please consider our Wireless Audit offering.<\/em><\/p>\n<h2>Do I Need One?<\/h2>\n<p>There are several reasons to conduct a penetration test on a wireless solution. For example:<\/p>\n<ul class=\"ili-indent\">\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-500 size-thumbnail\" src=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/11\/shield-question-01-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-question-01-150x150.png 150w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-question-01-300x300.png 300w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-question-01-768x768.png 768w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-question-01-1024x1024.png 1024w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-question-01-100x100.png 100w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-question-01.png 1600w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>To eliminate or report on critical vulnerabilities in your environment<\/li>\n<li>To evaluate the risk and impact of security vulnerabilities in order to prioritise future work<\/li>\n<li>To comply with an industry standard or to achieve accreditation<\/li>\n<li>In response to a security incident in your organisation<\/li>\n<\/ul>\n<p>If any of these situations apply, then a <strong>Wireless Penetration Test<\/strong> is something you should consider.<\/p>\n<h2>What Will I Gain?<\/h2>\n<p>A penetration test should at a minimum:<\/p>\n<ul class=\"ili-indent\">\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-501 size-thumbnail\" src=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/11\/shield-tick-01-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-tick-01-150x150.png 150w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-tick-01-100x100.png 100w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/shield-tick-01.png 256w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Confirm or deny whether you are protected from all <em>known<\/em> exploits applicable to your system<\/li>\n<li>Provide concrete evidence of that protection or lack of it<\/li>\n<li>List discovered vulnerabilities, including their risk and impact<\/li>\n<li>Recommend remediation steps<\/li>\n<\/ul>\n<p>A thorough assessment may, in addition, provide the following:<\/p>\n<ul class=\"ili-indent\">\n<li>Indicate areas where best security practice has not been followed<\/li>\n<li>Highlight potential areas of vulnerability in your system<\/li>\n<li>Rate the overall level of security risk found in the system<\/li>\n<\/ul>\n<h2>What is different about securing Wireless networks?<\/h2>\n<p>Wireless is somewhat different from traditional wired networking environments in that a would-be attacker does not require physical access to your premises or your equipment to launch an attack.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-510 size-thumbnail\" src=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/11\/choice-01-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/choice-01-150x150.png 150w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/choice-01-100x100.png 100w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/choice-01.png 200w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Wireless signals by their nature travel long distances. With a suitably powerful receiver\/transmitter an attacker can exploit vulnerabilities in your site without ever setting foot near it.<\/p>\n<p>These facts can make a Penetration Test <em>more<\/em> <em>critical<\/em> for wireless networks than for traditional wired networks \u2013 since physical security is never sufficient.<\/p>\n<p>Further, a Wi-Fi services employ a complex but varied set of technologies, usually involving many different vendors &amp; systems all working together. For example, identity, authentication and access layer systems are often different products from different vendors.<\/p>\n<p>There are therefore many different opportunities to exploit the system in an enterprise wireless solution.<\/p>\n<h2>Our Process<\/h2>\n<p>We adopt a 4-phase approach to penetration testing.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-497 size-thumbnail\" src=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/11\/pc-secure-01-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-secure-01-150x150.png 150w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-secure-01-300x300.png 300w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-secure-01-768x768.png 768w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-secure-01-1024x1024.png 1024w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-secure-01-100x100.png 100w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/pc-secure-01.png 1757w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>This approach has been applied and refined over the course of many small to very large Wi-Fi solutions with great result for you, the customer:<\/p>\n<ol class=\"ili-indent\">\n<li>Scope<\/li>\n<li>Plan<\/li>\n<li>Execute<\/li>\n<li>Report<\/li>\n<\/ol>\n<h3>Phase 1: Scope<\/h3>\n<p>It is important to scope the work for your particular systems and solution. This ensures only relevant tests are performed and reported on. We also determine how and where the tests will be performed, and what pre-requisite information and equipment is needed to perform the tests. This phase takes place through a discovery process with the customer.<\/p>\n<h3>Phase 2: Plan<\/h3>\n<p>The suite of tests is planned. A methodology for each test is determined.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-505 size-thumbnail\" src=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/11\/target-01-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/target-01-150x150.png 150w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/target-01-300x300.png 300w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/target-01-100x100.png 100w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/11\/target-01.png 512w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Phase 3: Execute<\/h3>\n<p>The tests are performed onsite.<\/p>\n<h3>Phase 4: Report<\/h3>\n<p>The results of the tests are reported on and analysed. Remediation steps are recommended.<\/p>\n<h2>What Is Included?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-235 size-thumbnail\" src=\"https:\/\/www.airxperts.net\/wp-content\/uploads\/2017\/10\/Chart-150x150.png\" alt=\"Chart Icon\" width=\"150\" height=\"150\" srcset=\"https:\/\/airxperts.net\/wp-content\/uploads\/2017\/10\/Chart-150x150.png 150w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/10\/Chart-100x100.png 100w, https:\/\/airxperts.net\/wp-content\/uploads\/2017\/10\/Chart.png 200w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Your comprehensive Wireless Penetration Testing Report will include:<\/p>\n<ul class=\"ili-indent\">\n<li>Executive Summary<\/li>\n<li>Technical Summary<\/li>\n<li>Details of Test Suite<\/li>\n<li>Detailed Technical Findings, including:\n<ul>\n<li>Risk<\/li>\n<li>Impact<\/li>\n<li>Recommended Remediation<\/li>\n<\/ul>\n<\/li>\n<li>for each discovered vulnerability<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What Is It? A Wireless Penetration Test is an evaluation of the security of your existing Wi-Fi service. A penetration test is an in-depth assessment of a system, from the point of view of a would-be attacker. The tester constructs a barrage of tests that seeks to exploit vulnerabilities in the solution or the underlying &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/airxperts.net\/index.php\/services\/wireless-coverage\/wireless-penetration-testing\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Wireless Penetration Testing&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":37,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-153","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/pages\/153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/comments?post=153"}],"version-history":[{"count":11,"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/pages\/153\/revisions"}],"predecessor-version":[{"id":570,"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/pages\/153\/revisions\/570"}],"up":[{"embeddable":true,"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/pages\/37"}],"wp:attachment":[{"href":"https:\/\/airxperts.net\/index.php\/wp-json\/wp\/v2\/media?parent=153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}