Wireless Security

Identify weaknesses in your wireless infrastructure.

Our consultants assess your wireless network security, reviewing access point configurations, encryption standards, network segmentation, and guest network isolation to identify weaknesses in your wireless infrastructure.

What we offer

Wireless security, assessed thoroughly.

Comprehensive Coverage

Every assessment covers your full wireless footprint including corporate SSIDs, guest networks, and access point configurations.

Real-World Testing

We go beyond configuration review to perform active testing, assessing wireless security protocols, unauthenticated access, access controls, and network isolation.

Actionable Reporting

Clear findings with prioritised remediation guidance and recommended configuration changes to strengthen your wireless infrastructure.

Scope

Areas we can test.

Encryption & Authentication
Wireless security protocols, pre-shared key strength, 802.1X/RADIUS implementation, and certificate validation.
Access Point Configuration
SSID management, broadcast settings, channel configuration, and management interface security.
Access Point Configuration Review
Review of access point settings, firmware versions, management interfaces, and SSID broadcasting configuration.
Network Segmentation
Guest network isolation, VLAN assignment, inter-SSID access controls, and wired/wireless boundary enforcement.
Client Isolation
Testing whether wireless clients can communicate with each other directly, potentially enabling lateral movement.
Authentication Testing
Active testing of wireless authentication mechanisms, including capture and offline cracking to assess the strength of wireless passwords.
How we work

Our methodology.

Step 01

Scoping

We work with your team to define the SSIDs, physical locations, and access requirements for the assessment.

Step 02

Passive Reconnaissance

Surveying the wireless environment to identify all access points, SSIDs, clients, and network topology without interacting with the network.

Step 03

Active Testing

Hands-on testing of wireless security protocols, access controls, segmentation, and authentication mechanisms to identify exploitable weaknesses.

Step 04

Reporting

Clear, prioritised findings delivered with evidence and specific remediation guidance for your wireless infrastructure.

What you receive

Your deliverables.

01

Wireless Assessment Report

A single report covering executive summary, per-finding detail with severity ratings, evidence, reproduction steps, and prioritised remediation guidance.

02

Findings Debrief

A walkthrough of the results with your technical team, covering key findings, risk context, and remediation priorities, with time for questions.

03

Ongoing Support

Post-engagement support from the Illume team to answer questions about findings and remediation guidance.

FAQ

Frequently asked questions.

What do you need from us before testing begins?
We typically need a list of SSIDs in scope, the physical locations to be tested, and any access credentials for authenticated testing. We agree all requirements during the scoping call.
Will testing disrupt our wireless network?
We take care to avoid disruption. Passive reconnaissance and most active tests do not impact network availability. Any potentially disruptive tests, such as deauthentication attacks, are agreed with you in advance and conducted during approved windows.
Do you test guest networks as well?
Yes. Guest networks are included as standard. We test whether guest network traffic is properly isolated from the corporate network and unable to access internal resources it should not be able to reach.
Do your testers need to visit our premises?
Not necessarily. We can ship a preconfigured testing device to your office that your team plugs into the network, allowing our testers to perform the wireless assessment remotely. On-site testing can also be arranged if preferred.
How often should wireless assessments be carried out?
We recommend annual wireless assessments as a minimum, and after any significant changes to your wireless infrastructure such as new access point deployments, firmware upgrades, or changes to authentication configuration.
Get Started

Ready to assess your wireless security?

Speak to a consultant about your wireless security requirements. We'll provide a fixed-price proposal, with no obligation.