Identification and exploitation of security weaknesses in wireless devices that could allow a remote attacker to gain unauthorized access to organizational data.
• Wireless Reconnaissance• Idenitfy Wireless Networks
• Vulnerability Research and Identification
• Exploitation of Vulnerabilities
• Reporting and Post exploitation
Technical report, attack/vulnerability impact with mitigations guidelines/recommendations, revalidation test (if required), advisory