One of the primary reasons of wireless networks getting hacked is because of the poor native protocol and encryption design coupled with common mistakes in configuring enterprise WLANs. For instance, all of us are very much aware of how vulnerable WEP implementation NII offers comprehensive WLAN Auditing and Consultancy services to help assess the security posture of your WLAN and to configure it to the maximum security level possible.
Benefits of Wireless Auditing
- Helps understand the security vulnerabilities in current WLAN setup
- Helps to fix those issues
- Helps to get more control over wireless network
- Helps in increasing productivity
Enumerate Wireless Network
We start off the network performance assessment task, by first understanding the network setup. This can be achieved by reviewing the network diagram. Network diagram gives an overview of:NII Consultants start off the wireless hacking exercise first by enumerating i.e. looking out for wireless networks. Presence of WLAN is typically carried out in two ways:
- Lookout for the Wireless AP (Access Point) beacons; also called SSID
- Callout for typical/well known SSIDs can lookout for response.
Once the network setup and the information flowing in it is clearly understood, then NII consultants will start monitoring individual traffic on individual nodes for the volume of data transferred during typical times in the day and/or night. This exercise will give a clear picture of the company’s total bandwidth use.Based on the encryption used, whether it is WEP, WPA, LEAP, etc., NII will proceed for cracking the algorithm used to secure the network.
Following mind map gives a clear idea about the various other attacks which NII consultants would carry out.
Gaining Access over Wireless Network
NII Consultants will then fully penetrate and gain access and control over the entire Wireless network.
The wireless auditing report will be a comprehensive description of all vulnerabilities those were found during the exercise based on criticality ratings. The report will also contain a road map to securing the Wireless Network in a long run.