Wireless networks have become a common feature extension to many organizations perimeter network to meet an ever growing need for mobility and flexibility. It is well known and generally accepted that these wireless networks are inherently less secure than wired networks.
An insecure wireless network can in many cases expose an organization’s internal network to external attackers and thereby presents a significant risk to the security posture of that organization. Organizations must be extremely mind full of the security implications and risks an unsecured wireless network may potentially expose them too.
SudoSecure’s wireless penetration testing and assessment services are designed to evaluate these implications and risks by:
- Assessing the architecture and design of the wireless infrastructure
- Assessing the configuration of both the wireless infrastructure and the clients that connect to this infrastructure
- Assessing the security controls deployed to protect, segment, and monitor the wireless infrastructure
- The detection of unauthorized and/or rogue access points
SudoSecure’s wireless penetration testing is broken down into three specific phases: Discovery, Penetration, and Post Exploitation.
SudoSecure will identify points of exterior signal bleeding, inventory and gather information associated with authorized access points, and identify unauthorized access points during the discovery phase. This information will then be utilized by SudoSecure to formulate a plan of attack against the organization’s wireless network infrastructure.
During the penetration phase SudoSecure will attempt to exploit vulnerabilities and weaknesses within the wireless infrastructure, to include performing attacks against both the wireless access points and the wireless clients. These attacks typically include, but are not limited to, exploiting weak encryption and authentication protocols, default configurations, misconfigurations, man in the middle attacks and susceptibility to rogue access point association.
Once SudoSecure has successfully gained access into the wireless network we will move directly into the post exploitation phase. During the post exploitation phase SudoSecure will focus on gaining access to more restrictive and sensitive areas of the wireless and wired networks. This post exploitation phase focuses specifically on the examination and evaluation of the controls implemented to perform network segmentation between guest and employee wireless networks, as well as between the wireless and wired networks.