Audit of WLAN network

Audit of wireless networks is key to determining the correct network parameters, diagnosing and detecting irregularities, and choosing the optimal methods to correct them. Network audits are directly related to accurate and methodical measurements. To maintain optimal network operation and provide conditions for the efficient operation of infrastructure. It is worth remembering that measurements and audits should be carried out regularly, especially when there is e.g. change in the arrangement of shelves in the storage area, etc.

The purpose of network audits is to examine the interaction between devices included in the wireless network infrastructure in enterprises and neighboring organizations. During the audit procedure, we assess real security, efficiency and performance of the WLAN. The results of inspections and measurements carried out provide in-depth and realistic information about the state of the network. Wireless security audit allows you to verify the security status of your wireless network – both in terms of network susceptibility to third party operations, and other 802.11 systems

Wireless network security audit conducted by blackbox method - without any knowledge of device configuration. The test includes scanning wireless network indicated by the Customer.

An example of WLAN audit scope

  • Detection of wired networks (802.11a, 802.11b, 802.11g / n / ac / ax) in several selected places.
  • Determining the type of security for detected networks (Open System, WEP, WPA, WPA2).
  • If an Open class network is detected – an attempt to connect to an access point.
  • If a network with WEP security is detected – an attempt to break the encryption key and gain access to the network.
  • If a network with WPA-PSK security is detected – an attempt to break the encryption key (brute force method).
  • Verify SSID announcement mode and SSID values.
  • Attempt to detect the access point manufacturer.
  • Determination of the mechanisms used to authenticate the parties (based on the access data provided by the Customer).
  • Checking the use of authentication mechanisms offered by the 802.1X standard.