Wireless Penetration Audits

Wireless security can be a major concern for organizations. Threats to an organization from wireless networks are unique, and the risk the technology poses can be substantial. A wireless penetration audit identifies weaknesses in a network using real-world hacking tools and programs.

Tanner’s wireless penetration testing and network security assessment services help evaluate the security of an organization’s wireless implementation. It provides solutions that take into consideration a company’s size, and sensitivity of its data to determine the importance and urgency of each recommendation.


A wireless infrastructure security test focuses on identifying and verifying potential threats and attack vectors. Tanner’s network security team will evaluate the wireless signal coverage to identify the following:

  • Areas of Signal Bleeding

  • Authorized Access Points

  • Rogue Employee Access Points

We are then able to create a structured plan for wireless security vulnerability assessment and wireless penetration testing.

Once the wireless access points have been discovered, Tanner will attempt to enumerate weaknesses in the wireless infrastructure. Our unique approach to wireless penetration tests includes the following:

  • Exploiting weak encryption protocols, such as legacy WPA and WEP

  • Identifying weak or easily guessed pre-shared keys

  • Testing default configurations and open wireless access points

  • Identifying misconfigurations

  • Determining user susceptibility to rogue access point association

  • Preventing man-in-the-middle attacks

In the next phase of testing, we connect to the network and attempt to escalate access to higher privileged areas. This includes examination of the segmentation between guest and employee wireless networks, as well as the configuration of the wireless network.


The deliverable for this engagement includes two main parts:

  • A report highlighting the gaps identified in the wireless penetration test.

  • Prioritized recommendations to help remediate the identified risks and improve the overall security of the wireless network.

Tanner Trust T Logo

Unmatched Industry Experience

With Tanner, you gain access to:

  • Industry analysts with valuable, relevant credentials, including Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP)

  • Thorough security assessments based on knowledge and experience

  • Post-engagement reviews (included in our upfront pricing)

  • Complimentary access to a dedicated security analyst for a minimum of one year after any engagement

  • Flexible test scheduling that helps prevent system interruptions

John Pohlman Headshot

John Pohlman

Director of Information Security Services

Contact Us