Through WiFi Intrusion Tests, the security of the systems will be assessed by identifying any potential security issues and providing the most appropriate solution for each of them.
Carrying out these tests on a regular basis helps maintain a high level of security, despite the usual changes and degradation that occur in information systems.
Internet Security Auditors has been providing Intrusion Test services since 2001. Its extensive experience in delivering this service has made it possible to develop a working methodology that has evolved over the years, adapting to the various needs required by our clients.
The WiFi Intrusion Test simulates the actions of an attacker attempting to gain access to the client’s systems and information through the wireless communications infrastructure, using the same tools and methodologies employed by hackers, but in an ‘ethical’ manner. The purpose of WiFi Intrusion Tests is to assess the security level of the information systems by identifying security issues within the systems analyzed.
The client does not provide information about the structure of their networks or the characteristics of their systems. It is the security team performing the audit that gathers this information. This ensures that the tests remain objective and follow the same steps that a real attacker would take when attempting to compromise the company’s systems.
These services must be carried out on the client’s premises in order to perform the specific attacks associated with these technologies.
A WiFi Intrusion Test consists of the following phases:
The following attacks against WiFi networks will be carried out, performing the corresponding tests in each applicable case.
Bypassing MAC Filtering Protection
MAC address filtering can be circumvented using any of the following tools:
- SMAC
- Bwmachak
- Ifconfig
- Macchanger
Exploitation of WEP‑Protected Networks
The WEP encryption method is exploited using a WiFi card capable of packet injection together with the Aircrack‑ng suite.
The following attacks will be performed:
- Attack 1: Client authentication
- Attack 2: Fake authentication
- Attack 3: Interactive packet forwarding
- Attack 4: Traffic reinjection
- Attack 5: KoreK “chopchop” attack (CRC prediction)
Exploitation of WPA‑Protected Networks
The objective is to obtain data such as the WiFi network’s WPA key.
Exploitation of WPA2‑Protected Networks
The objective is to obtain data such as the WiFi network’s WPA2 key.
Exploitation of Captive Portals
This test analyzes various aspects related to this access control mechanism:
- Network‑level aspects
- Application‑level aspects
After completing the tests, the results are analyzed and the associated documentation is generated:
- Executive summary of the audit results.
- Detailed results of the different tests performed, identifying the security issues found and specifying the conditions under which they were detected, so they can be reproduced (as far as possible) to facilitate their identification and resolution.
- Recommendations to effectively address the identified security issues.
- Classification of detected security issues according to their severity level.