Wireless Penetration Testing

Why Wireless Penetration Testing?

WiFi is no longer just a “nice to have” but a mission critical component to many businesses.
Service Description

The service covers all threat vectors concerning mobile applications on Apple iOS and Google Android. The audits carried out include reverse engineering of the application, application runtime analysis, traffic flow & encryption flaws, insecure storage, code signing, memory protections, API endpoints analysis as well as fuzzing and exploitation. We will test your Android and iPhone mobile applications to make sure they cannot be compromised. We can also include backend servers in the testing. 

Tests performed

Our testing methodologies are aligned with the NIST and SANS testing frameworks. This includes encryption and authentication attacks (WEP, WPA/2 PSK, WPA Enterprise), vendor (hardware & software) attacks, VLAN isolation tests / spoofing attacks, captive portal & rogue AP attacks (MITM) and DoS and de-authentication attacks.

Flexible Options
Why us?
Get In Touch!

Learn more about our services and solutions to your cybersecurity challenges and regulatory requirements.