Skip to main content

WiFi Penetration Test

WiFi Penetration Test

Through WiFi Intrusion Tests, the security of the systems will be assessed by identifying any potential security issues and providing the most appropriate solution for each of them.

Carrying out these tests on a regular basis helps maintain a high level of security, despite the usual changes and degradation that occur in information systems.

Internet Security Auditors has been providing Intrusion Test services since 2001. Its extensive experience in delivering this service has made it possible to develop a working methodology that has evolved over the years, adapting to the various needs required by our clients.

 

Service Features

The WiFi Intrusion Test simulates the actions of an attacker attempting to gain access to the client’s systems and information through the wireless communications infrastructure, using the same tools and methodologies employed by hackers, but in an ‘ethical’ manner. The purpose of WiFi Intrusion Tests is to assess the security level of the information systems by identifying security issues within the systems analyzed.

The client does not provide information about the structure of their networks or the characteristics of their systems. It is the security team performing the audit that gathers this information. This ensures that the tests remain objective and follow the same steps that a real attacker would take when attempting to compromise the company’s systems.

These services must be carried out on the client’s premises in order to perform the specific attacks associated with these technologies.

A WiFi Intrusion Test consists of the following phases:

 

PLANNING

PLANNING

Definition and identification of the systems to be audited.

AUDIT

AUDIT

Execution of tests carried out progressively until intrusion is achieved and, once obtained, escalation within the systems.

DOCUMENTATION

DOCUMENTATION

Preparation of all the results obtained.

Scope of the Tests

The following attacks against WiFi networks will be carried out, performing the corresponding tests in each applicable case.

Execution of Network- and System-Level Tests

Bypassing MAC Filtering Protection
MAC address filtering can be circumvented using any of the following tools:

  • SMAC
  • Bwmachak
  • Ifconfig
  • Macchanger

 

Exploitation of WEP‑Protected Networks

The WEP encryption method is exploited using a WiFi card capable of packet injection together with the Aircrack‑ng suite.
The following attacks will be performed:

  • Attack 1: Client authentication
  • Attack 2: Fake authentication
  • Attack 3: Interactive packet forwarding
  • Attack 4: Traffic reinjection
  • Attack 5: KoreK “chopchop” attack (CRC prediction)

 

Exploitation of WPA‑Protected Networks
The objective is to obtain data such as the WiFi network’s WPA key.

Exploitation of WPA2‑Protected Networks
The objective is to obtain data such as the WiFi network’s WPA2 key.

Exploitation of Captive Portals
This test analyzes various aspects related to this access control mechanism:

  • Network‑level aspects
  • Application‑level aspects

 

Results

After completing the tests, the results are analyzed and the associated documentation is generated:

  • Executive summary of the audit results.
  • Detailed results of the different tests performed, identifying the security issues found and specifying the conditions under which they were detected, so they can be reproduced (as far as possible) to facilitate their identification and resolution.
  • Recommendations to effectively address the identified security issues.
  • Classification of detected security issues according to their severity level.

What Our Clients Say


Do not hesitate to contact us if you need more information.

Send us your questions and we will get back to you as soon as possible.
CAPTCHA