Dark Web Assessment
A Dark Web Assessment finds data collected about your organization from the hidden corners of the internet.
In our Wireless Network assessment we conduct an initial site survey to create an inventory of client devices and access points: both known and unknown. Using this information, we conduct a full analysis of hardware and software versions, device configurations, authentication protocols, and vulnerabilities in order to identify conditions which may be exploited to compromise the environment.
Beyond just this initial assessment, we can also perform a targeted penetration test of an organization's wireless network. This will prove that vulnerable conditions can be exploited, leading to compromise of the network overall.
The assessment portion of this engagement can be completed in a week, and the penetration portion can range up to a few weeks or longer depending on the level of coverage and depth of exploitation. We look for the following:
What APs exist – managed, unmanaged, nearby, and rogue, signal strengths and coverage, as well as factors related to a site's physical makeup.
Review of hardware, software, authentication, and associated configurations.
Penetration test and exploitation of assets associated with the wireless network deployment.
Assessment of the degree to which malicious, rogue devices can be used to target a clients and users.