Threat Ninja

Wireless Penetration Testing Masterclass

What is Wireless Penetration Testing?

Nowadays, Wireless Penetration Testing can be considered as one of the main testing for any organization. When we talk about Wireless, it can be dangerous because of the attacker can easily sniffer any traffic where they can obtain any sensitive information via wireless access point. The attacker also can try to gain access to the access point.

For example, the attacker can take down the access point of wireless and make an exact copy of the access point. From the victim’s point of view, they think that they are accessing the Wireless Access Point while they actually connect to the dummy access point.

Wireless Penetration Testing Approach

Before the Wireless Penetration Testing, the security tester need to main point of the Wireless Penetration Testing such as follows:

  • What is the potential risk of wireless access point that can be exploited by the attacker?
  • Is the Wireless Vulnerabilities well-known to the public?
  • What type of encryption is been used on the Wireless Access Point?
  • Is it easy to crack the wireless password without using brute-force method?

Wireless Penetration Testing Tools

1. Aircrack.ng

The most famous and well-known tools that been using is Aircrack.ng. This tools is been used for 802.11 WEP and WPA-PSK cracking tools for wireless password keys. It normally captures any packets of the network and it will trying to guess or cracking the password by analyzing the packets that it captures.

2. Kismet

Another tools that can be used for the Wireless Penetration Testing Tools is Kismet. This tools is normally used for the Wireless troubleshooting. It also a tools for the Wi-Fi 802.11 a/b/g/n layer 2 wireless network sniffer and IDS( Instrusion Detection System). Just like Aircrack. it will also collects or capture packets in a passive mode where it will identify the standards of the network and also trying to sniff any hidden network available.

Recommendation

  • SSID Security

The SSID Security here means that they should hide the SSID to the public where it will catch the attention of the attacker if the SSID name similar or have related name to the organization.

  •  Encryption Security

It is advisable to use a strong encryption for the access point with the support of the strong password policy

  • Access Point Update

The organization need to update the Access Point software to the latest version where the previous vulnerabilities is already patch.

0 thoughts on “Wireless Penetration Testing Masterclass”

Write a Reply or Comment

Your email address will not be published. Required fields are marked *