<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">

Wireless Network Assessment

A Wireless Network Assessment discovers weaknesses in access points, signals, and clients in a wireless environment. 


Pulsar Security Introduces Wireless Protection Services

24/7/365 affordable protection

In addition to traditional one time static wireless assessments, we now offer real time dynamic wireless assessments.

Most organizations are too busy to cobble together the equipment, software and expertise needed to properly monitor wireless threats, but Pulsar's Sonar Units monitor and protect the wireless networks you care about.

  • Identifies and tracks malicious threats in real time
  • Out of the box configuration for 24/7/365 monitoring
  • Units are owned & operated by Pulsar, so if there is an issue we replace units if needed
  • Easy to understand reports & real time notifications with data stored in Sonar cloud

In our Wireless Network assessment we conduct an initial site survey to create an inventory of client devices and access points: both known and unknown. Using this information, we conduct a full analysis of hardware and software versions, device configurations, authentication protocols, and vulnerabilities in order to identify conditions which may be exploited to compromise the environment.

Beyond just this initial assessment, we can also perform a targeted penetration test of an organization's wireless network. This will prove that vulnerable conditions can be exploited, leading to compromise of the network overall.

The assessment portion of this engagement can be completed in a week, and the penetration portion can range up to a few weeks or longer depending on the level of coverage and depth of exploitation. We look for the following:

  • What APs exist – managed, unmanaged, nearby, and rogue, signal strengths and coverage, as well as factors related to a site's physical makeup.

  • Review of hardware, software, authentication, and associated configurations.

  • Penetration test and exploitation of assets associated with the wireless network deployment.

  • Assessment of the degree to which malicious, rogue devices can be used to target a clients and users.