Let's Talk

or call 801-532-7444 today

Tanner LLC 
36 S. State St., Suite 600
Salt Lake City, UT 84111

United States
Phone: (801) 532 7444
Maps & Directions 
Sitemap

 

2019 Tanner LLC
All Rights Reserved.

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Instagram
  • Twitter Social Icon

Let's Talk

WIRELESS PENETRATION TESTING SERVICES

Wireless Vulnerability Assessment and Services Penetration Audits

 

Wireless security can be a major concern for organizations. Threats to an organization from wireless networks are unique, and the risk the technology poses can be substantial. A wireless penetration audit identifies weaknesses in a network using real-world hacking tools and programs.

 

Tanner’s wireless penetration testing and network security assessment services help evaluate the security of an organization’s wireless implementation. It provides solutions that take into consideration a company’s size, and sensitivity of its data to determine the importance and urgency of each recommendation.

 

Methodologies for Wireless Penetration Testing

 

A wireless infrastructure security test focuses on identifying and verifying potential threats and attack vectors. Tanner’s network security team will evaluate the wireless signal coverage to identify the following:

 

  • Areas of Signal Bleeding

  • Authorized Access Points

  • Rogue Employee Access Points

 

We are then able to create a structured plan for wireless security vulnerability assessment and wireless penetration testing.

 

Once the wireless access points have been discovered, Tanner will attempt to enumerate weaknesses in the wireless infrastructure. Our unique approach to wireless penetration tests includes the following:

 

  • Exploiting weak encryption protocols, such as legacy WPA and WEP

  • Identifying weak or easily guessed pre-shared keys

  • Testing default configurations and open wireless access points

  • Identifying misconfigurations

  • Determining user susceptibility to rogue access point association

  • Preventing man-in-the-middle attacks

 

In the next phase of testing, we connect to the network and attempt to escalate access to higher privileged areas. This includes examination of the segmentation between guest and employee wireless networks, as well as the configuration of the wireless network.

 

Penetration Test Deliverable

 

The deliverable for this engagement includes two main parts:

 

  • A report highlighting the gaps identified in the wireless penetration test.

  • Prioritized recommendations to help remediate the identified risks and improve the overall security of the wireless network.

Engage the security experts

Learn how Tanner’s security services can help you accomplish your specific business goals.

Tanner LLC