Wireless Network Pentest

Home  /  Red Team
Wireless Network Pentest

Wireless networks are widely used in restaurants, cafes and airports in many areas. Wireless network (WIFI) security, in short, is the whole of the measures taken to prevent cyber criminals from accessing the data you use online (these can be your personal information or of your customers, credit card information, biometric data or any data on a computer with internet access).

  • Penetration checks are performed on wireless networks using 802.1x.
  • Wireless networks of the target system (SSID) and hidden wireless networks (Hidden SSID) are detected.
  • The encryption methods used in the wireless network will be determined, mobile devices connected to the wireless network will be found and information gathering work will be carried out for the systems connected to the wireless network.
  • The IP address range used will be determined, the device type is determined from the MAC address and the operating system discovery stages are carried out.
  • The IP address of the Access Point device will be searched, security tests and authentication (open / shared) checks are performed for the management interface of this device.
  • IP addresses and operating systems of the clients connected to the network will be determined.
  • MAC address filtering will be determined, bypassing the MAC address filtering feature and hotspot bypass tests are conducted.
  • Authentication token hijacking is done.
  • In monitor mode, client isolation mode tests, MITM tests for clients connected to the network and fake upgrade tests of clients connected to the network are conducted.
  • Attempts to obtain WEP / WPA key will be made from clients connected to the network.
  • Attempts to obtain WPA / WPA2 key will be checked.
  • For WEP key cracking, traffic is collected and traffic is generated on WEP networks that are not connected to the client.
  • WEP / WPA / WPA2 key cracking tests are conducted.
  • MAC protection bypass tests will be done, handshake messages are tried to be captured for WPA cracking.
  • Discovery will be carried out for WPS supported wireless networks and PIN number tests are performed.
  • Attempt is made to break the WPA key of Access Points using WPS.
  • By sending fake link requests, connection limits are forced.
  • Attempt is made to obtain sensitive information of wifi users.
  • De-authentication attacks and de-associate attacks are carried out on wireless clients connected to the network.
  • It will be checked whether there are Rogue Access points or not.
Gais Security
Gais Security

Gais Cyber Security Technologies is on your side with its expert team.