This curriculum spans the technical and procedural rigor of a multi-phase wireless security engagement, comparable to an internal red team assessment or consultancy project focused on regulatory-aligned network hardening.
Module 1: Scoping and Authorization for Wireless Assessments
- Define the legal boundaries of engagement by verifying written authorization that explicitly includes 802.11 a/b/g/n/ac/ax spectrum and client probing activities.
- Determine whether the assessment includes rogue access point detection, client impersonation, or deauthentication testing, and document exceptions.
- Coordinate with facilities and security teams to avoid triggering wireless intrusion prevention alerts during active scanning.
- Identify and exclude sensitive areas such as executive floors or R&D labs from automated scanning based on organizational policy.
- Map wireless VLANs and SSID segmentation to ensure testing aligns with network zoning and does not cross security boundaries.
- Establish communication protocols with IT operations for immediate escalation if scanning disrupts critical wireless services.
Module 2: Wireless Reconnaissance and Signal Mapping
- Conduct passive packet capture using 802.11 monitor mode to identify all broadcast and hidden SSIDs without transmitting frames.
- Use directional antennas and spectrum analyzers to triangulate the physical location of access points and detect rogue devices.
- Record signal strength (RSSI) and channel utilization across multiple physical locations to assess coverage gaps and overlap.
- Document non-Wi-Fi interference sources such as Bluetooth, microwave ovens, or wireless cameras using 2.4 GHz and 5 GHz spectrum tools.
- Correlate BSSID timestamps and beacon intervals to detect virtual or cloud-managed access points that may indicate misconfigurations.
- Export channel occupancy data for 2.4 GHz (channels 1, 6, 11) and 5 GHz DFS/non-DFS bands to evaluate congestion and reuse patterns.
Module 3: Authentication and Encryption Analysis
- Identify use of deprecated protocols such as WEP, WPA, or PSK with weak passphrases through handshake capture and offline analysis.
- Test for susceptibility to KRACK (Key Reinstallation Attack) on WPA2/WPA3 networks by analyzing 4-way handshake implementations.
- Verify correct configuration of 802.1X/EAP methods (e.g., EAP-TLS vs EAP-PEAP) and validate certificate chain trust on RADIUS servers.
- Assess pre-shared key (PSK) entropy and determine if default or common passwords are used across multiple access points.
- Check for improper fallback mechanisms, such as WPA2-to-WPA or enterprise-to-personal mode downgrades during authentication.
- Validate that management frame protection (802.11w) is enabled to prevent disassociation and deauthentication attacks.
Module 4: Client Isolation and Network Segmentation
- Test inter-client communication on the same SSID to verify client isolation (AP isolation) is enforced at the access point or switch level.
- Attempt layer 2 ARP spoofing between wireless clients to evaluate switch port security and dynamic ARP inspection settings.
- Trace client traffic from wireless VLANs to ensure it is routed through appropriate firewalls and not bridged to internal segments.
- Validate that guest SSIDs use VLANs with restricted egress rules and are isolated from corporate subnets at the L3 boundary.
- Check for improper trunking of wireless VLANs to non-edge switches, increasing lateral movement risk.
- Evaluate DHCP scope assignments on wireless subnets to prevent IP conflicts or unauthorized gateway advertisements.
Module 5: Wireless Intrusion Detection and Monitoring
- Assess deployment density and placement of wireless IDS/IPS sensors to ensure full 2.4 GHz and 5 GHz coverage across facilities.
- Review alerting thresholds for rogue AP detection to distinguish between authorized extenders and malicious devices.
- Validate that MAC address spoofing of known authorized devices triggers alerts in the wireless management platform.
- Test automated response capabilities, such as AP shutdown or client quarantine, and evaluate false positive impact on operations.
- Examine log retention policies for wireless events to ensure sufficient data exists for forensic reconstruction of incidents.
- Integrate wireless alerts with SIEM systems and verify correlation rules detect beacon flooding or authentication storms.
Module 6: Active Exploitation and Post-Connection Testing
- Perform deauthentication attacks in controlled conditions to assess client reconnection behavior and capture handshake data.
- Set up an evil twin access point with a legitimate SSID to test user awareness and endpoint connection policies.
- Inject packets into open or weakly secured networks to evaluate switch port security and NAC enforcement.
- Conduct IPv6 transition tunneling tests (e.g., 6to4, Teredo) over wireless to identify covert channels bypassing firewalls.
- Test captive portal bypass techniques, including DNS manipulation and HTTP header injection, to assess enforcement strength.
- Use packet injection tools to evaluate resilience against fragmentation and QoS exploitation on congested channels.
Module 7: Reporting and Remediation Prioritization
- Classify findings using CVSS vector extensions for wireless (e.g., Adjacent Network metric) to reflect exploitability context.
- Differentiate between configuration drift (e.g., channel overlap) and critical vulnerabilities (e.g., WEP usage) in risk ratings.
- Provide remediation steps that align with vendor-specific firmware update paths and configuration templates for access points.
- Include signal heatmap overlays in reports to visually correlate coverage areas with security weaknesses.
- Recommend phased mitigation plans for high-risk issues such as insecure RADIUS configurations or unsegmented guest networks.
- Document tested countermeasures, such as management frame protection or EAP downgrade prevention, to validate fix effectiveness.
Module 8: Regulatory Compliance and Audit Alignment
- Map wireless scan findings to specific controls in PCI DSS (e.g., Requirement 11.1) for environments handling cardholder data.
- Verify encryption and access control configurations meet HIPAA technical safeguards for protected health information over Wi-Fi.
- Assess adherence to NIST SP 800-48 Rev. 1 guidelines for wireless network use in federal and contractor environments.
- Document wireless segmentation and monitoring practices to support SOC 2 Type II audit requirements for availability and confidentiality.
- Review BYOD policies and ensure wireless assessment scope includes personally owned devices connecting to corporate resources.
- Align rogue AP detection procedures with ISO/IEC 27001 Annex A.13.2.3 on network service security management.