{"id":249,"date":"2018-03-10T23:57:32","date_gmt":"2018-03-10T23:57:32","guid":{"rendered":"http:\/\/www.ebruu.com\/?page_id=249"},"modified":"2019-09-29T13:02:02","modified_gmt":"2019-09-29T13:02:02","slug":"wireless-penetration-test","status":"publish","type":"page","link":"https:\/\/www.ebruu.com\/index.php\/wireless-penetration-test\/","title":{"rendered":"Wireless Penetration Test"},"content":{"rendered":"\n<p>Wireless penetration testing is a test to determine the current situation of the client&#8217;s wireless infrastructure against attacks that can be done without and after being included in the enterprise wireless networks. A Wireless Penetration test might be an authorized or unauthorized hacking attempt, which is designed to detect and exploit vulnerabilities in security controls employed by a number of wireless technologies and standards, misconfigured access points, and weak security protocols.\u00a0<\/p>\n\n\n\n<p><strong>Some of our wireless penetration testing steps;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>SSID Discovering   in the target enviroment<\/li><li>Enable wifi adaptor montinotr mode<\/li><li>Find and try to crack WPS enabled AP<\/li><li>Hidden SSID discovering<\/li><li>Information gathering(MAC addr.) on the   connected clients<\/li><li>Identify   Wireless Encrytion Methods<\/li><li>Try to identify mobile devices in the   Wireless Network<\/li><li>Try to identify type of device from MAC   address<\/li><li>Try to discover Wireless Network&#8217;s IP   subnet<\/li><li>Security tests on the AP management   webinterface<\/li><li>Security tests on the AP management IP   address<\/li><li>Open\/Shared authenticated tests on the   AP<\/li><li>Discovering IP addresses and operating   systems of clients\u00a0<\/li><li>Check MAC filtering status<\/li><li>Try to bypass MAC filtering if it is   enabled.<\/li><li>Hotspot bypassing techniques<\/li><li>DNS tunneling tests<\/li><li>MITM attack tests for the clients<\/li><li>Social engineering for connecte clients.<\/li><li>WEP\/WPA\/WPA2 password cracking<\/li><li>Fake SSID broadcasting tests<\/li><li>Hotspot simulation tests<\/li><li>Try to get WPA\/WEP keys from the   connected clients<\/li><li>De-authentication tests for connected   clients<\/li><li>Arp-replay attack<\/li><li>Chop-chop attack<\/li><li>WPS Pin attack<\/li><li>Well-known issues on the target AP   brands.<\/li><li>Configuration Tests on the AP<\/li><li>Try to intercept WPA2 handshake and   perform brute force<\/li><li>Automate scanning to connected clients  and AP<\/li><\/ul>\n\n\n\n<p>If you would like to know how Wireless Penetration Testing Service can be beneficial for your company or more information about our service,&nbsp;<a href=\"http:\/\/www.ebruu.com\/index.php\/contact\/\">please contact our security experts<\/a>&nbsp;to get a free quick consultation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wireless penetration testing is a test to determine the current situation of the client&#8217;s wireless infrastructure against attacks that can be done without and after being included in the enterprise wireless networks. A Wireless Penetration test might be an authorized or unauthorized hacking attempt, which is designed to detect and exploit vulnerabilities in security controls [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-249","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":6,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/249\/revisions"}],"predecessor-version":[{"id":436,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/249\/revisions\/436"}],"wp:attachment":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/media?parent=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}