WIRELESS

PENETRATION TESTING

Wireless Devices

Wireless devices have become the norm within corporate infrastructures to allow flexibility and ease of communication within a team orientated environment. Wireless devices are heavily targeted due to their broadcast proximity which can extend past your physical security perimeter. 

CyberArq’s team of experts assess your organizations wireless devices leveraging a comprehensive suite of technical tests designed to establish the security posture of your organizations wireless networking infrastructure. This assessment tests all known attack vectors against wireless networks which use standard wireless networking technologies (802.11, IR, Bluetooth).

Our attack stages are aligned with the following phases; device enumeration, signal interception testing, authentication and access testing, wireless bridge testing and wireless policy compliance testing.

When should my organization have a penetration test?

• Satisfy PCI, HIPAA and NERC-CIP compliance 
• Test your cyber-security controls after they mature
• To match up critical vulnerabilities with critical assets
• To identify all false-positives and false-negatives

• At least annually, recommended semi-annually
• After changes to your configurations or hardware
• Patch management remediation on discovered vulnerabilities
• AS OFTEN AS YOU LIKE

Penetration Testing Approach & Methodology

1. Define Scope

Detailed outline with the customer to define what assets are in scope.

5. Exploitation

Exploit vulnerabilities discovered in the vulnerability analysis stage with custom and generic exploitation scripts.

2. Information Gathering

Map out the corporate infrastructure based on services, ports, hardware, software and operating system. 

6. Post Exploitation

Successful exploitation’s lead to privilege escalation and new vulnerabilities to test for exploitation.

3. Threat Modeling

Determine mission critical and connected assets to corporate data through white, gray or black box approach.

7. Reporting

Creation of  Executive and Detail technical reports for both management and remediation team.

4. Vulnerability Analysis

Utilize enterprise and custom scanning tools to uncover vulnerabilities.

8. Exit Call

Call scheduled with customers management and remediation team to explain in detail the findings and assist in remediation processes.

1. Define Scope

Detailed outline with the customer to define what assets are in scope.

2. Information Gathering

Map out the corporate infrastructure based on services, ports, hardware, software and operating system. 

3. Threat Modeling

Determine mission critical and connected assets to corporate data through white, gray or black box approach.

4. Vulnerability Analysis

Utilize enterprise and custom scanning tools to uncover vulnerabilities.

5. Exploitation

Exploit vulnerabilities discovered in the vulnerability analysis stage with custom and generic exploitation scripts.

6. Post Exploitation

Successful exploitation’s lead to privilege escalation and new vulnerabilities to test for exploitation.

7. Reporting

Creation of  Executive and Detail technical reports for both management and remediation team.

8. Exit Call

Call scheduled with customers management and remediation team to explain in detail the findings and assist in remediation processes.

Why Choose CyberArq?

CyberArq’s industry leading security professionals are readily available to assist and recommend additional security methods to better protect your organizations environment. Our experts will work with your organization team leads to stimulate either a real-life penetration testing scenario with zero knowledge known as blackbox, partial knowledge, known as graybox or with full information on the corporate infrastructure disclosed to perform a whitebox assessment.

Advisory Solutions

VULNERABILITY ASSESSMENT

Network devices, Cloud infrastructure, Web applications, Wireless, Mobile applications and Internet of things devices

PENETRATION TESTING

Network devices, Cloud, Wireless, Web application, Internet of things devices, Mobile applications, Social engineering, Continuous penetration testing and Active directory enumeration

Your Trust, Our Protection

talk to a cyber security expert today!