Skip to main content

CyberAIware utilizes a three-phased approach to evaluate wireless networks:

Phase 1: Map and Identify Active Wireless Networks

We will investigate potential exploitation options that would be available to an individual with only radio access to the wireless network space. With only very limited knowledge, we will attempt the following:

  • Detect the wireless networks in place.
  • Determine the locations and ranges of the wireless networks.
  • Evaluate the range of the wireless access area (i.e., can a computer attach to the wireless LAN from another floor or from outside the building?).
  • Determine whether network configuration information is being advertised.
  • Probe points of entry for identifying system information or access parameters.

Phase 2: Assess Wireless Implementation for Vulnerabilities

Once wireless networks have been identified, we will investigate potential exploitation options as a user with normal user access within the target area. We will evaluate the security measures taken to secure the wireless infrastructure, including the following:

  • The use of WPS.
  • The use of WEP encryption.
  • The strength of WEP encryption.
  • The use of WPA/WPA2 encryption.
  • The strength of WPA/WPA2 encryption.
  • Network segmentation.
  • Access control devices (i.e., wireless MAC address access lists, RADIUS, filtering routers, firewalls, etc.).

Phase 3: Exploit Vulnerabilities and Access Other Networks

We will attempt to exploit the wireless network vulnerabilities and weaknesses discovered during Phase 2 and obtain access to other network segments (either wired or wireless). If access is obtained, various methods to increase privileges will be attempted. We will attempt to determine the following:

The wired network segments and systems, if any, the wireless network infrastructure can access.

Any Critical Vulnerabilities/Risks identified

Any Critical Vulnerabilities/Risks identified will be immediately reported to management for appropriate action. The final report will describe the identified vulnerabilities/risks (prioritized as Critical, High, Medium, or Low), along with cost-effective recommendations for the remediation.

Translate »