Perimeter Service // 0x08

WIRELESS
TESTING

Assess the invisible boundaries of your organization. We test WiFi (802.1x), Bluetooth, and RFID deployments to prevent physical bypass of technical controls.

Wireless Methodology

Tactical RF testing to identify leaks in your physical and digital perimeter.

01 // DISCOVER

Signal Discovery

War-walking and signal mapping to identify all broadcasting access points and hidden SSIDs.

02 // ENCRYPT

Encryption Audit

Testing WPA2/3, 802.1x, and Bluetooth pairing for protocol and implementation flaws.

03 // ROGUE

Rogue AP Testing

Deploying "Evil Twin" and pineapples to test client detection and responder capabilities.

04 // ACCESS

Access Control

Bypassing PSK/PEAP mechanisms to gain internal network access via RF.

05 // BT & RFID

RFID Probing

Testing physical building access controls (HID, Mifare) for cloning and replay risks.

WIRELESS INSIGHTS

Heat Map Audit

Visual map of signal leakage beyond physical boundaries.

Rogue Detection

Evaluation of internal IDS/WIPS capabilities to detect attacker signals.

Hardening Plan

Config specs for WPA3-Enterprise, AP isolation, and EAP methods.