Verify that authorized wireless access points (APs) and wireless network configurations adhere to security best practices to prevent unauthorized access, eavesdropping, and rogue device connections.
Given access to wireless networks, wireless access point controllers or management consoles, and wireless scanning tools.
Wireless networks are verified as secure, unauthorized or weakly secured wireless networks are identified, and corrective actions are tracked.
Example:
SSID | Encryption | Auth Type | VLAN | Notes |
---|---|---|---|---|
CorporateWiFi | WPA3 | 802.1X | VLAN 10 | Corporate devices only |
GuestWiFi | WPA2 | PSK | VLAN 20 | Internet-only, segregated |
Operator Note: SSIDs using Open or WEP encryption are HIGH RISK → flag immediately.
Tool | Platform | Usage |
---|---|---|
Kismet | Linux | Passive wireless detection |
WiFi Explorer | macOS | GUI visualization |
Airodump-ng | Linux | CLI-based scanning |
sudo airodump-ng wlan0
Review discovered networks:
Operator Note: Look for duplicate SSIDs → possible Evil Twin attacks.
Setting | What to Verify |
---|---|
Encryption | WPA2 or WPA3 → avoid WEP/Open |
Authentication | Use 802.1X for enterprise or PSK for guest |
MAC Filtering (optional) | Enforced where applicable |
SSID Broadcast | Hidden SSIDs do NOT equal secure → ensure proper controls in place |
Operator Note: Guest networks MUST be segmented (different VLAN, no LAN access).
Suspicious Activity | Action |
---|---|
Unauthorized client connected to corporate SSID | Validate device ownership and MAC address |
High number of deauthentication packets | Possible wireless attack (deauth/Evil Twin) |
Unusual MAC vendors (ex: virtualized MAC addresses) | Flag for investigation |
Operator Note: If using WPA2 Enterprise, validate only managed devices can connect.
Tool | Platform | Usage |
---|---|---|
Wi-Spy / Chanalyzer | Windows/macOS | RF analysis |
Kismet + SDR | Linux | RF signal detection |
Operator Note: Rogue APs may not broadcast SSIDs → RF detection helps find hidden threats.
For any weaknesses or issues found:
Issue | Action |
---|---|
Open/WEP networks | Migrate to WPA2/WPA3 immediately |
Rogue AP detected | Coordinate with network owners for removal |
Unsegmented guest networks | Implement VLAN separation |
Unauthorized clients | Investigate and block if malicious |
Operator Note: Always document proposed fixes and work through network owners or administrators.
Tool | Platform | Installation | Usage |
---|---|---|---|
Kismet | Linux | Package manager | Passive wireless scanning |
Airodump-ng | Linux | Aircrack-ng suite | Passive wireless scanning |
WiFi Explorer | macOS | GUI visualization | |
Wireless LAN Controller | Web/Appliance | Native | Configuration validation |
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Created from scratch with detailed operator-focused wireless security validation process | Leo |