Wireless Penetration Test
Discover, Locate and Access
Interview Customer
RF Signature Analysis Scan for networks using directional antennas Physically locate AP based upon signal strength Bluetooth Scanning
Define scope of work
WiSpy Spectrum Analyzer AirDefense Bluescanner
Customer signs off on testing
WiFiHopper
Sniffing and Capturing Data
Capture and Analyze VoIP traffic Capture Email Passwords Capture and Analyze Web Email Traffic Capture and Analyze Web Site Traffic
Clearsight Winsiffer Netresident Driftnet
Etherape
Cracking 802.11 Encryption and
Authentication on Protected Networks
LEAP Cracking WPA-PSK Dictionary Attack WEP cracking and decrypting WEP traffic WEP Cracking Acceleration Tools
Rogue Access Points and Client Hacking
Client Hijacking / Evil Twin AP Fake Hotspot Piggybacking on a captive portal
Zyxel Soft AP Linux Script Linux Script
Create a captive portal using DD-WRT
Denial of Service
Narrowband RF Jamming Wideband RF Jamming Queensland Attack Deauth 802.11 Associate / Authentication Flood
2.4 GHz video camera Prism Test Utility Linux Script
Document and write report of findings CommView
Creative Advanced Attacks
Present wireless security assessment report AirDefense Air terminate
to customer