Wireless network technologies started to take more place in our lives day by day. With the development of wireless network technologies, some security risks also arise. In our Wireless Network Security Test service, penetration tests are performed for wireless networks used in the corporate network infrastructure, weak points in wireless networks are detected, and these weaknesses are reported to the institution with the removal method. Thus, vulnerabilities that pose a risk over wireless networks are tried to be eliminated before they are used by an attacker. During the tests, tests are also carried out in a special profile for guest networks that are frequently encountered in institutions. Thus, it is aimed to take the highest level of security measures by trying the transitions from the guest networks to the local network, isolation and bypassing techniques.
- Detection of Wi-Fi Networks in the Environment
- Detection and Analysis of Authentication Mechanism
- Open Authentication
- Shared Authentication
- Discovery of Wireless Network Interface Operation Modes
- Monitor Mode
- Managed Mode
- Master Mode
- Ad – Hoc Mode
- Active Discovery Methods
- Monitoring Clients Connected to WLAN
- Monitoring APs (Access Points) in the environment
- Passive Discovery Methods
- Revealing Hidden Networks (Hidden SSID)
- Finding Networked Wi-Fi Clients
- Finding MAC and IP Addresses of Clients on the Network
- Reading the Properties of Wi-Fi Devices in the Environment
- Detection of Security Vulnerabilities in Wireless Networks
- Software and Protocol Vulnerabilities on Wireless Network
- Vulnerabilities in Wireless Network Hardware
- Attacks on Wireless Networks
- Attacks Against Wireless Network Users
- Sniffing on Wireless Networks
- Wireless Spoofing Attacks
- MAC Address Spoofing
- IP Spoofing
- Frame Spoofing
- Session Hijacking
- DoS Attacks on Wireless Networks
- Aireplay-ng, mdk3, void11
- Jamming, Jammers
- Creating DoS with Deauthentication Messages