24/7 SOC







Wireless Penetration Testing

Wireless technologies provide seamless access to IT resources from desktop and mobile devices located in office or remote locations. In expanding the physical and geographic coverage of an IT system, they provide the hacker with the opportunity to monitor network traffic and easily gain access to individual computers, servers, databases and software applications.
A wireless penetration test is designed to assess an IT network for vulnerabilities and security issues associated with wireless access. It particularly focusses on the ‘external view’ as seen by a hacker with respect to wireless access points, access control, encryption, wireless fingerprinting and information leakage. Penetration tests are used as a practical guide to improve the security of an IT system and to meet the organisational requirements for compliance to standards that include the Payment Card Industry Data Security Standard (PCI DSS) and ISO 27001.

What is a wireless penetration test?

Penetration testing or ethical hacking uses a series of automated and manual processes to discover the security weaknesses in an IT network. Performed with the permission of the system owner, security vulnerabilities are identified and exploited to demonstrate how they can be used to facilitate a cyber attack. Measures and controls to prevent or mitigate the impact of an attack are recommended for each major vulnerability.

Penetration test report

Our Wireless Penetration Test Report includes an overview of the tests performed, an executive management summary, a technical summary and a technical detail section. The Common Vulnerability Scoring System (CVSS) describes the principal characteristics of a vulnerability and defines a numerical score reflecting its potential severity of impact. Remedial activities that prevent or mitigate the cyber exploits associated with each vulnerability are identified and linked to references that provide further detailed background information.

Our Team

The Wizard Cyber penetration testing service is delivered by an experienced team who are certified by CREST (the Council of Registered Security Testers) and have over 15 years of combined experience in the field of information assurance and penetration testing. They are guided by the best practice testing methodology as published by OWASP, OSSTMM, CVSS and the SANS Institute.


The benefits of a wireless penetration test

  • Find rogue or open access points
  • Discover vulnerabilities that support encryption cracking, sniffing and session hijacking
  • Identify insecure wireless encryption standards such as WEP
  • Spot security weakness in Bluetooth connected devices
  • Ensure compliance to data security standards that include PCI DSS and ISO 27001

Penetration Testing Process

  • null


    → Assessment of requirements and objectives for all wi-fi networks to be tested

  • null


    → Manual and automated information gathering to validate details of the scope

  • null


    → Automated Scanning – vulnerability assessment using scanner applications
    → Manual Testing – individual simulated attacks by qualified penetration tester

  • null


    → Full report on vulnerabilities and recommended remedial activity

  • null


    → Remedial activity is implemented, and the test is repeated to check the effectiveness of the new controls

Why use Wizard Cyber for network penetration testing?

  • Experienced Consultants – With over 15 years combined corporate expertise in the field of information assurance & penetration testing
  • Bespoke penetration testing – We will develop a test that fits your business needs
  • Testing Tools – We use open source and commercial tools and our own testing apps developed by our in-house software development team
  • Fully accredited – Certified by CREST and with qualifications from EC Council, Offensive Security and SANS
  • Reporting – Clear and easy to understand reports including recommendations for remediation and improvement
  • Fair Pricing – Fixed price proposals with fully detailed project scope and no unexpected costs