SBN

When is Wireless Penetration Testing Appropriate?

Introduction

Wireless communications are an invisible, ubiquitous service that allows data to flow in and out of businesses and homes via mobile devices and wireless infrastructure. Almost all modern organizations have at least some level of wireless networking (or Wi-Fi) at their disposal, but the proper implementation of such a service doesn’t always get the attention that it deserves. Network segmentation, VLAN routing and SSID controls all need to be clearly defined and set up, allowing for users to connect and use the service easily while keeping would-be intruders and freeloaders off the network.

Regardless of how much or how little consideration has been given to the setup of your wireless network, businesses need to proactively search out any weaknesses in security if they are to avoid unauthorized access to network resources and data leakage.

What Steps Are Taken During a Wireless Pentest?

This will depend on the standard that is being followed by the person performing the tests, as well as what the methods are that the company has agreed to, as well as the scope and the areas tested. Generally speaking, the pentester will begin with an intelligence- and information-gathering exercise. They will create a heat map of the area that is being tested, which tracks the size and footprint of the wireless signal that is being broadcasted. A great source of pentesting methodologies and standards can be found here.

Other information about the network (such as the hardware installed, the number of SSIDs being broadcast and the network configuration relating to the Wi-Fi equipment) needs to be documented and labelled. Creating a site map is also a good place to start.

The next step is to gauge what kind of threats the company that is being tested could be vulnerable to, based on the hardware installed on (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Graeme Messina. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/aVxdO0Brq3o/