Is an authorized hacking attempt, which is designed to detect and exploit vulnerabilities in security controls employed by a number of
wireless technologies and standards, misconfigured access points, and weak security protocols.
Squnity identifies the wireless infrastructure components that can be discovered and connected to,
as well as the security mechanisms which are enforced. Our approach is to conduct a mix of black-box and white-box testing.
We start by completing a site survey, where we use high powered wireless equipment to locate access points.
We then map the wireless infrastructure presence and identify and detect vulnerabilities within the wireless spectrum.
Infrastructure security testing generally includes:
An internal network pen test is performed inside a network to help gauge whether an employee or contractor could successfully conduct an insider attack, and the potential damage such an attack could cause.
This generally includes:
An external network pen test is designed to test the effectiveness of perimeter security controls as well as identify weaknesses affecting all other external-facing systems, such as web, mail and FTP servers
This generally includes:
Gain real-world insight into your vulnerabilities.
Enable encryption or choose a more secure protocol.
Determine whether partner organizations access more internal resources than you intended.
Identify what information a rogue employee could exploit.
Reconfigure software, firewalls and operating systems.
Identify any patches that need to be installed and Harden your access controls.
(+20) 1033658742
info@sud0root.com
Alfrdos street, Khartoum, Sudan