Wireless Penetration Testing

Category:

Description

Identification and exploitation of security weaknesses in wireless devices that could allow a remote attacker to gain unauthorized access to organizational data.

 

Scope

Phase 1
• Wireless Reconnaissance• Idenitfy Wireless Networks
• Vulnerability Research and Identification

Phase 2
• Exploitation of Vulnerabilities
• Reporting and Post exploitation

Deliverables
Technical report, attack/vulnerability impact with mitigations guidelines/recommendations, revalidation test (if required), advisory

Reviews

There are no reviews yet.

Be the first to review “Wireless Penetration Testing”

Your email address will not be published. Required fields are marked *