Wireless Penetration Testing

Is Your Wireless Network Secure?

Wireless networks provide ease of access for your employees, guests and visits, but they also provide a security issue as the traditional boundaries of needing a cable to connect have been removed. It is important to test your wireless network and ensure appropriate controls are implemented to reduce the risk of an attacker compromising your wireless network from outside your premises.

The Triskele Labs Penetration Testing team are specialist wireless network experts who conduct testing to identify methods to compromise wireless networks and gain access to internal networks. While it may seem like wireless networks are secure as they need a password, if they are not properly configured, an attacker could gain access in minutes as your wireless network signals often extend out of range of your office, where anyone with a device can find them.

These networks can provide a key vulnerability should a malicious actor be able to gain access. We can ensure that these signals are only accessed by authorised users.

Why Triskele Labs?
  • Real-Time Portal To Provide Ongoing Results
  • CREST Registered Penetration Testing Company
  • Daily Start And End Of Day Notices
  • Complimentary Re-Testing For All Engagements

Our methodology is second to none

Foot-printing & Recon

Network foot-printing specifically identifies the Wireless Access Points (WAPs) in use, along with the broadcasting Service Set Identifier (SSID). This is carried out through conducting a site survey utilising specific hardware and toolset that allow for the identification of open and hidden networks. Traffic is collected and inspected utilising packet sniffers to identify the types of traffic being transmitted across the wireless networks.

Discovery & Probing

Triskele Labs will conduct discovery probing of all wireless networks considered in scope to gather additional information not discovery during the site survey. This will be conducted utilising automated tools and manual inspection through several mechanisms, including but not limited to signals analysis, Access point location and mapping using GPS and triangulation, ESSID broadcasts, Hidden SSID sniffing, BSSID detection for ad-hoc peer-to-peer networks.

Enumeration

Once a full understanding of the wireless architecture and perimeter is determined, enumeration will occur to begin preparations for exploitation. The Penetration Testing Team will enumerate information to identify authentication mechanisms, how users connect and logging & monitoring. In addition, users connecting to the networks will attempted to be gathered to allow for testing of unauthorised access.


Attack

Utilising the information gathered, the wireless networks are tested utilising infrastructure and client-side attacks. Where these attacks are successful, access to layer 3 networks may be possible and further reconnaissance and network identification can be performed.

Exploitation

If possible, Triskele Labs will pivot to other devices, especially those that may be dual homed and drop the Penetration Testing team onto a sensitive network.



Reporting

Utilising the results of testing, Triskele Labs will report on issues identified. False positives are reduced throughout the process.




We have worked with some of the best companies across the globe

Find out more about some of our amazing work

feature-1

Regional Australia Bank

As one of Australia's leading mutual banks, it is imperative Regional Australia Bank ensures appropriate cybersecurity controls are implemented. When they needed a cybersecurity partner, the team at Regional Australia Bank turned to Triskele Labs to draw on our vast experience and ensure proactive controls are implemented.

Read More

Wireless Attacks

  • Radio Monitoring
  • Rogue Access Point
  • Man in the Middle
  • Session Hijacking
  • Credential Theft
  • Unencrypted WiFi
  • Passive Connections
  • Unencrypted Login Forms
  • Password Re-Use

Protect Data

It is our goal to ensure that your most sensitive systems and data are protected and remain secure. Without Penetration Testing, you may be exposed.

Work With the Best

The Triskele Labs team have worked across Australia, New Zealand, Singapore, China and more. We understand our craft and know what to look for.

Australian Based Team

Unlike others who offshore their teams, all our Penetration Testers are located within our Australian offices and you can chat any time.

Dedicated Project Manager

All projects commence with a kick-off to ensure both teams have key contact points and know what is happening at all times.

Keep in Touch

Triskele Labs is built on a partnership approach. We appreciate face to face discussions over a Video Conference and ensure regular touch points with all of our clients. Reach out today to discuss any of your cybersecurity needs.

  • Level 4, 210 Kings Way, South Melbourne VIC 3205 Australia
  • info@triskelelabs.com
  • 130024CYBER
  • www.triskelelabs.com

Customer Review