Penetration Testing - Wireless Network Environment

Description

Security Footprint roleplays as a malicious user or attacker attempting to gain unauthorised access to the wireless network environment and its underlying infrastructure components. Key objectives include assessing the Wireless deployment against industry recognised security best practices, guidelines and company policy.

At a high level the security testing includes the following methodology:

  • Validate the security configuration of the underlying Wireless infrastructure
  • Validate rouge access point detection
  • Validate guest isolation where applicable
  • Validate wireless client security configuration through manual configuration review and active testing against connected clients
  • Validate that intrusion detection and prevention components are functioning as required.
  • Services
  • Wireless