An attacker does not need to enter
to reach your network.
On-site security testing of your WiFi infrastructure. Encryption, authentication, segmentation, and rogue access points all tested from the attacker's position.
What is a wireless pentest?
You know you have WiFi networks in your office. You have guest networks and corporate networks that should be separated. You get a complete picture of your wireless security: every network in range, every authentication weakness, and every segmentation gap. A wireless pentest is performed on-site and tests all networks visible from outside your building, not only the ones you expect to find.
Wireless Pentest: your network beyond the walls
Wireless networks extend your attack surface physically beyond the walls of your office. An attacker does not need to enter to reach your network. A wireless pentest examines the security of your WiFi infrastructure, from encryption and authentication to segmentation and rogue access points.
The team performs the test on-site with specialised hardware and software. All wireless networks in the environment are inventoried, including networks that should not be there. Each network is then tested for encryption strength, authentication mechanisms, segmentation from the corporate network, and configuration vulnerabilities.
A common risk is insufficient segmentation: the guest network that provides access to internal resources, or the IoT network on the same VLAN as workstations. The wireless pentest exposes these risks and demonstrates what an attacker can achieve via your wireless networks.
Three wireless risks that extend beyond your perimeter
-
Guest networks often reach internal resources
A guest WiFi that is not properly segmented gives anyone in the car park access to internal file servers, printers, or management interfaces. This is a common finding in organisations of all sizes.
-
Weak WPA2-PSK passwords are cracked in hours
Corporate WiFi networks using pre-shared keys with weak or common passwords can be compromised with widely available tools and wordlists, giving attackers full network access.
-
Rogue access points are planted without detection
A small access point connected to your wired network and broadcasting a corporate-looking SSID can capture credentials and provide persistent wireless access. Most organisations have no detection capability for this.
Scope of the wireless pentest
How DEFION conducts a wireless pentest
Scoping
Locations, network names, expected SSIDs, and network segmentation overview.
Reconnaissance
Inventory of all wireless networks in the environment using specialised hardware.
Authentication and encryption tests
Assessment of WPA2/WPA3 configuration, 802.1X implementation, and PSK strength.
Attack simulation
Evil twin attacks, deauthentication, rogue AP detection, and credential capture attempts.
Segmentation test
Verifying whether wireless networks are correctly separated from the corporate network.
Reporting
Report with findings, network diagram, and remediation steps including configuration advice.
Deliverables
- Executive summary
- Wireless network overview with all detected networks
- Technical report with findings and exploitation evidence
- Segmentation assessment
- Remediation steps and configuration advice
- Report debrief
Who is a wireless pentest for?
Any organisation with wireless networks needs to understand whether those networks are secure and properly segmented. The larger and more distributed your wireless environment, the higher the risk.
- Organisations with multiple office locations
- Companies with guest networks or BYOD policies
- Healthcare, hospitality, and education with extensive WiFi
- Organisations that want to validate their network segmentation
- Companies preparing NIS2 or ISO 27001 compliance
FAQ
Does the test have to be on-site?
Are guest networks also tested?
Do you disrupt the wireless network during the test?
Can this be combined with an internal pentest?
How often should a wireless pentest be performed?
Ready to test your wireless security?
Tell us your locations and wireless infrastructure. We schedule the on-site assessment quickly.
®