WIFI Testing

Measure the overall security of your wireless infrastructure and ensure the integrity and security of your WIFI networks.

Wireless clients are extremely vulnerable to exploits. Know how vulnerable your WLANs are and receive remediation recommendations to improve your wireless security.

WIFI Penetration Testing:
A Hybrid Approach

MainNerve utilizes automated, as well as comprehensive manual testing, throughout the WIFI penetration testing process. WIFI pen tests are performed in order to identify all wireless network and business-logic related vulnerabilities. At MainNerve, all of our WIFI security tests go beyond national standards such as NIST, and come with a detailed final report detailing the results of the test. This final report includes an executive summary, a listing of risk ratings, remediation recommendations, and more.

Identify Wireless Security Vulnerabilities

Simply because of its nature and medium, wireless networks are inherently less secure than wired networks. From rogue access points to weak encryption algorithms… to customers that access your wireless networks, threats to WIFI networks are unique… and the risk they pose for businesses can be significant. It is for this very reason that businesses must be cognizant of the security implications associated with an unsecured wireless network. MainNerve’s wireless penetration testing services help businesses evaluate the security of their wireless implementations and provide remediation recommendations for improvement.

Test your wireless network against:

WIFI Misconfiguration

Legacy Encryption

Weak Encryption Keys

Evil Twin Attacks

Insecure EAP Types

WIFI Protected Setup (WPS) Vulnerabilities

And more…

THE MAINNERVE PROCESS

Almost every organization is using WIFI for their communication and data transfer. This internal communication contains lots of sensitive information. And if an unauthorized user is able to sniff or connect to the wireless access point, the hacker will be able to retrieve lots of information as now the hacker has access to the internal network. The impact this can have on organizations data confidentiality, integrity, authentication, and access controls is substantial.

Computer chip

PLANNING

The planning phase of WIFI penetration testing process includes establishing Rules of Engagement, communicating about on- and off-limit access points (Scoping), the overall timeline of the WIFI security test, and whether or not the test will be performed using White, Gray, or Black Box methodologies.

Computer chip

DISCOVERY

MainNerve will perform extensive enumeration and footprinting of the wireless target environments in order to identify and verify all access points. During this phase, MainNerve will also determine the encryption types used across the wireless environment. At this point, key targets will then be selected for exploitation during the attack phase. If, during the discovery phase of the WIFI penetration test, unencrypted networks are discovered, clear-text transmissions will be captured and reassembled to identify user credentials and other sensitive information.

Computer chip

ATTACK

The attack phase of the WIFI pen test process is where exploitation of any vulnerability and/or misconfiguration occurs. During this phase, MainNerve may initiate several attacks depending on the wireless environment. These attacks can include man-in-the-middle attacks, exploitation of rogue access points, brute force attacks, session hijacking, and more. MainNerve will try to exploit potential vulnerabilities by utilizing a blend of custom, open source, and commercial software tools. Throughout the attack phase, MainNerve will employ a “target of opportunity” approach wherein MainNerve exploits a vulnerable host with the explicit intention of accessing sensitive information, establishing a persistent presence on the system, and exploiting the trusts of related systems..

Computer chip

REPORTING

At MainNerve, we consider the final phase of the WIFI security testing process, reporting, to be the most crucial and instrumental step. During this phase, we take great care to ensure we effectively communicate the value of our service and findings as thoroughly as possible. Our main goal is to ensure that all information from the WIFI security assessment is clearly understood and that a roadmap toward remediation/mitigation is well defined. A comprehensive final report detailing all testing information along with an executive summary is securely delivered during this step.

WANT TO LEARN MORE?

MORE INFORMATION

More About WIFI Testing

 

Overview

The primary objective behind a WIFI penetration test is to identify exploitable vulnerabilities, weaknesses, and technical flaws in wireless networks before hackers are able to discover and exploit them. WIFI pen testing reveals real-world opportunities hackers could use to compromise wireless networks in order to gain access to sensitive data or even take-over systems for malicious and non-business purposes.

A WIFI security test is a simulated attack carried out by our highly-experienced security engineers in an effort to:

  1. Identify security flaws present in your wireless environment
  2. Understand the level of risk any vulnerabilities pose for your organization
  3. Help address and fix identified wireless network flaws

MainNerve will determine the means and processes that an attacker would use to compromise wireless systems. This methodology includes specific phases (shown below) with continual reporting throughout the test. Testing will occur remotely from MainNerve’s main facility in Colorado Springs, CO, USA. If possible, internal testing will occur over a customer-provided, secure point-to-point wireless connection.

 

Benefits

All wireless networks can benefit from a WIFI pen test. At the conclusion of the WIFI security testing process, you will have an understanding of the risks associated with your wireless network, along with the solutions you need to implement in order to address those security weaknesses.

  • Identify specific security flaws present in your wireless environment
  • Reveal security vulnerabilities resulting from implementation and/or configuration errors
  • Test for the existence of wireless risks and threats (e.g. weak encryption)
  • Identify security design flaws and exploit the most critical vulnerabilities (e.g. cardholder data)
  • Meet any industry-related regulatory compliance standards
  • View your wireless networks through the eyes of a hacker
  • Discover where you can improve your security posture
  • Guidance to effectively remediate any uncovered vulnerabilities

 

Approach and Methodology

MainNerve performs wireless network assessments using the methods detailed in NIST SP 800-153: Guidelines for Securing Wireless Local Area Networks (WLANs). MainNerve will determine the means and processes that an attacker would use to compromise wireless networks. MainNerve uses highly-rated commercial tools, such as Aircrack-ng , Kali Linux, and Wireshark, to perform the assessment.

Wireless network assessments will involve no less than two experienced security professionals at any given time who will examine the weaknesses of the targeted networks. MainNerve will ensure that all vulnerabilities are documented and verified throughout the assessment. All reports (i.e. interim reports) will include a description of the exploit attempts and the successes or failures, documentation of testing activities, and remediation recommendations.

Prior to the assessment, MainNerve will confirm the scope of the test by providing proposed rules of engagement. These rules detail the on- and off-limit networks, dates/times for testing, and official contact information. Testing may occur during or after normal business hours. If testing is done during business hours, MainNerve can work with local IT employees to notify of significant events. If performed after business hours, there is less potential impact on business processes.

 

Phases

  1. Planning
  2. Discovery
  3. Attack
  4. Reporting

 

Deliverables

At MainNerve, we consider the Reporting/Delivery phase of our WIFI penetration testing process to be the most important. We take great care to ensure we effectively communicate the value of our service and findings as thoroughly as possible. Our main goal is to ensure that all information is clearly understood and that a roadmap toward remediation/mitigation is crystal clear. A WIFI Final Report with MainNerve includes:

  • Executive Summary
  • Statement of Scope
  • Statement of Methodology
  • Tools and Uses
  • Testing Narrative
  • Limitations (if applicable)
  • Findings
  • Supporting Data
  • Remediation Recommendations
  • Risk Rating

 

WIFI Testing Specifics

MainNerve has a breadth of experience performing wireless networking security assessments. This includes wireless vulnerability assessments and exploitation testing. Performed from the perspective of an attacker who is within wireless range, MainNerve evaluates the wireless network’s security posture in the context of generally accepted network security best practices alongside NIST SP 800-153: Guidelines for Security Wireless Local Area Networks (WLANs).

MainNerve’s wireless security testing focuses on enumerating and verifying potential attack vectors and threats to your business’ wireless infrastructure. During the test, we will perform a comprehensive architecture review, configuration review, and access point discovery.

Wireless Architecture Review: An examination of the wireless architecture and how it relates to the wired network environment.

Wireless Configuration Review: A thorough review of both the wireless client and wireless access point(s).

Access Point Discovery: Identification and documentation of all wireless access points in order to discover any points of exterior signal bleeding, inventory authorized access points, and detect rogue access points.

 

VALUE-ADDED SERVICES

Checklist

Network Penetration Testing

Network penetration testing assists with the identification and examination of vulnerabilities for external, Internet-facing and internal, intranet systems. A network pen test will help determine whether an attack can exploit and compromise targeted systems. Take the next step to improving your business’ security with a network pen test.

Checklist

Compliance Solutions

MainNerve’s compliance solutions are designed to help fill one of the biggest challenges for businesses: staying in alignment with the exhaustive list of Governance, Risk Management, and Compliance (GRC) requirements. From PCI DSS and HIPAA, to CJIS and FINRA, MainNerve can help your business navigate the GRC landscape with specialized penetration tests.

Checklist

Social Engineering

Social engineering, in the context of information security, is commonly defined as the of persuasion and/or manipulation techniques in order to influence people into performing actions or divulging confidential information. Ensure that your business is secure by testing and evaluating your employees against general phishing and “spear-phishing” attacks.