Wireless Network Professional Services
> Design > Installation > Support > Health Check > Locate and identify wireless networks > Wireless Access Point testing > Wireless security configuration > Detect rogue access points or wireless clients |
> Internal Radio Signal Propagation Analysis > Wireless AP Penetration > Wireless Client Penetration > Wireless Sniffing > Wireless Network Separation > Overall wireless security controls |
- Determine use of frequency-hopping spread spectrum (FHSS), direct-sequence spread spectrum (DSSS), or other method of transmission.
- Determine use of 802.11a, 802.11b, 802.11g, 802.11n, 802.1x, 802.11i
- Attempt man in the middle attack on other clients on the guest network with ARP route poisoning.
- Attempt guest network authentication code bypass by MAC spoofing and DHCP refresh.
- Determine the SSID and beaconing.
- Evaluate the amount of traffic generated by monitoring client activity and saturation.
- Evaluate implementation of channel use, spread spectrum, clients per AP for physical separation and client hopping and interference from third party networks.
- Attempt to associate with all access points.