Scorpiones Group

Network Defense - Leave it to the professionals.

Many business owners believe that they aren’t in risk of being attacked.
If you’re using WiFi at your organization to connect to the Internet from your computer or mobile devices, you could become the victim of a WiFi hacker unless you protect your network.

Scorpiones’s WiFi security assessments provide a cost-effective way to measure the security of your WiFi network(s) against best practice, and make real-world recommendations for identified issues.

What is our team testing?
The following is a general overview of the type of common WiFi vulnerabilities that we test for during a penetration test, and should not be considered exhaustive.

Don’t leave your organization unprotected!

Many organizations provide an unencrypted “guest” WiFi network for BYOD and corporate guest Internet access.
While the majority of these types of network are considered low risk by their very nature,
WiFi Security

They can introduce a number of potential attack vectors:

Endpoints themselves can potentially be attacked from another connected device.
While flaws in older encryption technologies such as WEP (Wire Equivalency Protocol) are well understood, some legacy hardware devices such as barcode scanners do not support newer, more secure alternatives.
The use of legacy encryption protocols, sometimes with additional compensatory controls masking the issue, is necessary.

Evil twin attacks involve introducing a malicious access point advertising a legitimate network name in order to fool devices into connecting to it. Once connected, a number of potential attacks can be attempted.

There isn’t an “All in one” solution that fits to every network, but being proactive and keeping your network hardware and software up to date is a universal must do.
Modern networks and firewalls utilize cloud technology to remain continuously updated with firmware and cyber defense updates.

Contact us now for a network evaluation and WiFi vulnerability check.

Tags: Penetration Testing Network Penetration Testing

Contact Us