Wireless Methodology

-identify the wireless threats facing an organisation info assets

-Change or upgrade existing infrastructure of software, hardware or network  design

-provide comprehensive approach of preparation steps that can be taken to prevent inevitable exploitation

-to test and validate the effieciency of wireless security protections and controls

-Find streams of sensitive data by sniffing the traffic

-Collect info on security protocols, network strength and connected devices


Wireless Pen Testing Framework:


Pen Testing for General Wifi Network Attack:


Pen Testing WEP encrypted WLAN:


Pen Testing WPA/WPA 2 Encrypted WLAN:


Pen Testing LEAP encrypted WLAN:


Pen Testing Uncrypted WLAN: