Wireless testing covers common forms of wireless communications utilized throughout an organization including wireless local area networks (WLANs), Bluetooth communication and wireless peripheral devices such as keyboards and mice. Wireless communication, if not properly secured and transmitted, can be obtained through wireless sniffing techniques and either read or altered. As technology continues to advance rapidly, it is important that organizations not only look at their wireless networks, but all forms of wireless communication occurring within the organization. These ad-hoc wireless communications and streams may represent entry points into the corporate network or leak sensitive data.
A wireless technical vulnerability assessment is conducted onsite using tools typically deployed by security testing professionals. The goal is to review the wireless environment including, but not limited to, WLANs, wireless peripheral devices, Bluetooth communications, and other wireless devices and signals that may be in use.