Skip to Main Content
Wireless Network Penetration Test

Wireless Network Penetration Test

SKU: 4450
Format: Consultancy

This CREST consultant-driven penetration test is designed to help you find and fix WLAN weaknesses before attackers take advantage. By regularly testing your wireless network, you can identify and close any security holes before a criminal hacker can slip through.

This test can be used to help meet the requirements of the PCI DSS (Payment Card Industry Data Security Standard) and ISO 27001. 

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account.  Apply online today or call our service centre team on 00 800 48 484 484.

For more information about this service or to get a tailored quote for your organisation, please enquire below and one of our experts will be in touch shortly.Enquire about this service
Overview

IT Governance will perform a penetration test to identify and exploit vulnerabilities within your wireless network. This service provides for IT Governance to conduct a thorough reconnaissance of where a wireless signal can be received across your targeted locations by an attacker and a technical test (including those detailed within the OSSTMM (Open Source Security Testing Methodology Manual)) of your wireless network.

This approach will emulate the techniques of an attacker, using many of the same readily available tools. This enables a full assessment of the key components of the wireless network and supporting infrastructure.

The identified vulnerabilities are presented in a format that allows an organisation to assess their relative business risk and the cost of remediation.


Your challenge

Employing a wireless solution can offer greater flexibility, but it comes with greater potential for attack by expanding your organisation’s logical perimeter. An insecure wireless network opens up your organisation to the external world and poses a security risk. From rogue access points to weak encryption algorithms, threats to wireless networks are unique and the risks can be significant.


Our service offering

  • A detailed consultation to identify the depth and breadth of the tests required, with careful scoping of the test environment to establish the exact extent of the testing exercise.
  • A range of manual tests conducted by our team of highly skilled penetration testers using a methodology closely aligned with the Open Source Security Testing Methodology (OSSTM).
  • A series of wireless surveys of the scoped environment, with automated and manual identification of vulnerabilities.
  • Immediate notification of any critical vulnerabilities in order for you to take action quickly.
  • A detailed technical report that details the identified vulnerabilities (ranked in order of significance).
  • A list of recommended countermeasures to address any identified vulnerabilities.
  • An executive summary that explains in business terms what the risks mean

Benefits

  • Gain real-world insight into your vulnerabilities;
  • Detect default Wi-Fi routers;
  • Identify rogue or open access points;
  • Establish misconfigured or accidentally duplicated wireless networks;
  • Detect security vulnerabilities in Bluetooth technology; and
  • Identify insecure wireless encryption standards (such as WEP).
Conditions

Service conditions

  • Testing of two SSIDs/ESSIDs with full WLAN assessment, including the identification of rogue access points, non-encrypted data, WEP key security, DoS (denial of service) and MAC spoofing.
  • Quote covers one fixed business premise with a floor space of up to 500m2.
  • Consultant expenses related to travelling, etc. are not included in the price.
  • On-site presentation of report findings and remedial consultations can be provided upon request at an additional cost.
  • Discounts for multiple tests only apply when a two- or three-year contract is agreed at the purchase of the first test; discounts cannot be backdated. Each penetration test will be invoiced annually (in the year of the test). An invoice will be issued 28 days before the planned test.
Why IT Governance?

Why choose us?

  • Penetration tests should only be carried out by experienced consultants with the necessary technical skill set and qualifications. Our consultants have strong technical knowledge and a proven track record in finding security vulnerabilities. They can carry out exploits in a safe manner and advise on appropriate mitigation measures to ensure that your systems are secure.
  • Our CREST-certified penetration testing team will provide you with clarity, technical expertise and peace of mind knowing that your wireless network has been reviewed by experienced testers in line with your business requirements.
  • For Azure clients, our penetration tests comply with the Microsoft Rules of Engagement . This means we take care to limit all penetration tests to your assets, thereby avoiding unintended consequences to your customers or your infrastructure.

Opiniones de clientes

arriba
Cargando…