APPS

WIRELESS AUDIT

Wifi Audit

Wifi security audit focused on the detection of security risks in business wireless networks. To improve understanding of which tests to perform a Wifi audit and how to guide a Wifi security audit, Wardsec has developed the OWISAM security methodology.

OWISAM is the acronym for “Open Wireless Security Assessment Methodology” which stands for open wireless security assessment methodology. Thanks to the use of Creative Commons licenses, the entire community can make use of this methodology, modify it and improve it over time.

At Wardsec we have unified information cybersecurity services and intelligence solutions to build our portfolio of professional solutions.

Our differentiating factors are the great specialization, the technical quality of our team and the high investment in R&D, to keep up to date with the cutting-edge security techniques with which to reduce the risks of computer attacks.

OWISAM methodology

The OWISAM security methodology defines a total of 64 technical controls, grouped into 10 categories, which specify a set of tests necessary to ensure a successful security audit on a wireless infrastructure..

Analysis

Coverage analysis and rogue APs

The analysis of Wifi performance and its coverage is one of the services in which Wardsec has more experience thanks to the knowledge obtained with the development of Acrylic Wifi’s own wireless network monitoring solutions.

The increase in the use of personal devices in companies (Bring your own device) enables users to set up Wi-Fi access points that degrade the performance of data communications and VoIP.

Wardsec has unique tools to automatically generate complete inventories of Wi-Fi devices located within the company, analyze coverage of Wi-Fi access points, measure interference in the radio electric space (RF Analysis), detect the location of the signal emission from Wi-Fi devices, review security with the methodology OWISAM, analyze the location and antennas of the access points and check the correct selection of channels to optimize the Wi-Fi network.

The processing of this information obtained in studies site survey It can be used to detect the presence of unauthorized access points (Rogue APs) and their location, reducing the risk of information theft through Wi-Fi networks, and supporting your security procedures in monitoring access points.

 

Check out our Wi-Fi coverage and security analysis products or contact us to see how we can help you improve your wireless network.

Main security risks

In addition to a security analysis aimed at verifying all technical controls, it is possible to perform a Wireless audit taking into account only the 10 main security risks that wireless infrastructures have.

OWISAM Top 10 defines the main security risks for wireless networks:

  • OWISAM-TR-001: Open Wifi communication network.
  • OWISAM-TR-002: Presence of WEP encryption in communication networks.
  • OWISAM-TR-003: Insecure Device Key Generation Algorithm (Passwords and WPS)
  • OWISAM-TR-004: Dictionary-based WEP / WPA / WPA2 key.
  • OWISAM-TR-005: Insecure Authentication Mechanisms (LEAP, PEAP-MD5)
  • OWISAM-TR-006: Device with support for Wifi protected setup PIN active (WPS).
  • OWISAM-TR-007: Wifi network not authorized by the organization.
  • OWISAM-TR-008: Insecure hotspot portal.
  • OWISAM-TR-009: Client trying to connect to insecure network.
  • OWISAM-TR-010: Network coverage range too wide.

The use of open methodologies for Wireless auditing and the use of cutting-edge software products in Wifi security analysis allow you to obtain the best protection for your infrastructure.