> interface: wlan0 —— mode: monitor —— channel: hopping —— target: your corporate network —— question: what can we reach from the car park?<span class="cursor-blink">_</span>_
Every wired network has a defined physical boundary. Cables terminate at wall sockets. Switches sit in locked cabinets. To connect to the network, an attacker must gain physical access to a port — which means bypassing doors, locks, access control systems, and potentially security guards. The physical perimeter and the network perimeter are, in most cases, the same thing.
Wireless networks destroy that alignment. The moment an organisation deploys a wireless access point, the network perimeter extends beyond the physical perimeter — through walls, through windows, through ceilings, and into the car park, the street, the neighbouring building, and any other location within radio range. An attacker does not need to enter the building. They do not need to bypass a single physical security control. They can sit in a vehicle with a laptop and an antenna and interact with the corporate network from outside the premises. They can probe it, attack it, and — if it is poorly configured — join it, all without setting foot on the organisation's property.
This is the fundamental security challenge of corporate wireless: it creates an attack surface that exists in physical space that the organisation does not control. The signal does not stop at the property boundary. The attacker's access begins wherever the signal reaches. Wi-Fi penetration testing exists to assess this attack surface — to determine what an attacker positioned within radio range of the organisation's wireless infrastructure could discover, exploit, and access.
Standard corporate access points have an effective range of 30–100 metres indoors. With a directional antenna — commercially available for under £50 — an attacker can reliably interact with a Wi-Fi network from several hundred metres. With a high-gain parabolic antenna, connections at over a kilometre have been demonstrated. The 'our Wi-Fi doesn't reach outside the building' assumption is almost always wrong.
Before examining the attack techniques, it is important to understand the common wireless architectures deployed in corporate environments — because the security posture, the attack surface, and the appropriate testing methodology differ significantly depending on how the wireless network is configured.
| Configuration | Authentication Method | Typical Use | Security Posture |
|---|---|---|---|
| WPA2-Personal (PSK) | Pre-Shared Key — a single password shared by all users. Anyone who knows the password can connect. | Small businesses, guest networks, home offices. Sometimes found on corporate networks where convenience has been prioritised over security. | Weak. A single shared secret means that any user who knows the password can share it, and the password cannot be revoked for individual users without changing it for everyone. Susceptible to offline dictionary and brute-force attacks against captured handshakes. If the PSK is compromised, every device on the network is affected. |
| WPA2-Enterprise (802.1X) | Individual authentication via 802.1X using a RADIUS server. Each user authenticates with their own credentials (username/password, certificate, or both) through an EAP method (PEAP-MSCHAPv2, EAP-TLS, EAP-TTLS). | The standard for corporate wireless in medium to large organisations. Integrates with Active Directory or other identity providers for centralised authentication and access control. | Significantly stronger than PSK. Individual credentials enable per-user access control, revocation, and auditing. However, the security depends heavily on the EAP method used and whether certificate validation is enforced on client devices — a misconfiguration that creates one of the most significant wireless attack vectors we test. |
| WPA3-Personal (SAE) | Simultaneous Authentication of Equals — replaces PSK with a key exchange protocol resistant to offline dictionary attacks. | Newer deployments, particularly where PSK is required but offline attack resistance is desired. Adoption growing but not yet universal. | Significantly improves on WPA2-Personal by preventing offline password cracking — each authentication attempt must occur online against the access point, enabling rate limiting and lockout. However, transition mode (allowing WPA2 and WPA3 clients simultaneously) reintroduces WPA2 vulnerabilities. |
| WPA3-Enterprise | Enhanced 802.1X with mandatory 192-bit security suite, Protected Management Frames (PMF), and stronger cryptographic requirements. | High-security environments, government, defence, financial services. Requires compatible access points and client devices. | The strongest available standard. Mandatory PMF prevents deauthentication attacks. 192-bit suite enforces strong cryptography end to end. Adoption is growing but requires hardware and client support that many organisations have not yet deployed. |
| Open / Captive Portal | No wireless authentication. Users connect to an open SSID and are redirected to a captive portal for acceptance of terms, email registration, or voucher-based access. | Guest networks, public Wi-Fi, hospitality, retail, conference venues. | No encryption on the wireless link. Traffic is visible to any device in monitor mode. Captive portal provides access control but not confidentiality. Must be strictly segmented from the corporate network — and verifying that segmentation is a key testing objective. |
A corporate Wi-Fi penetration test follows a structured methodology that progresses from passive reconnaissance through active testing to exploitation and post-exploitation analysis. Each phase builds on the intelligence gathered in the previous one, and the approach is adapted based on what we discover about the target environment.
The following sections detail the specific attack techniques used during wireless penetration testing. Each technique targets a different aspect of the wireless security architecture, and the applicability of each depends on the configuration of the target environment.
WPA2-Personal networks authenticate clients using a Pre-Shared Key (PSK). The security of the entire network depends on the strength of this single password — because the authentication handshake contains enough information for an attacker to test candidate passwords offline, without any further interaction with the access point.
| Technique | How It Works | What It Demonstrates |
|---|---|---|
| Four-Way Handshake Capture | When a client connects to a WPA2-PSK network, it performs a four-way handshake with the access point. We capture this handshake by placing our adapter in monitor mode and either waiting for a client to connect naturally or sending deauthentication frames to force a client to disconnect and reconnect (triggering a new handshake). The captured handshake is then subjected to offline password cracking using tools such as Hashcat or Aircrack-ng with dictionaries, rule sets, and brute force. | If the PSK is a dictionary word, a common phrase, a predictable pattern, or shorter than approximately 12 random characters, it will be cracked — often in minutes or hours. Demonstrates the risk of weak PSK selection and the fundamental limitation of shared-secret authentication. |
| PMKID Harvesting | Discovered in 2018, this technique captures the PMKID (Pairwise Master Key Identifier) from the first frame of the four-way handshake — or in some implementations, from a single association request to the access point. Unlike the full handshake capture, this does not require a connected client and does not require deauthentication attacks. We simply send an association request to the target access point and capture the PMKID from the response. The PMKID contains the information needed for offline password cracking. | Demonstrates that the PSK can be attacked even when no clients are connected. A network that appears unused or dormant is still vulnerable if the PSK is weak. This technique is faster and stealthier than traditional handshake capture. |
| Offline Dictionary and Brute Force | Once a handshake or PMKID is captured, we test the PSK against extensive dictionaries (common passwords, organisation-specific terms, industry wordlists), apply mutation rules (appending numbers, substituting characters, capitalisation variations), and — for shorter keys — attempt exhaustive brute force. Modern GPU-accelerated cracking with Hashcat can test billions of WPA2-PSK candidates per second. | Demonstrates the practical strength of the PSK against realistic attack capability. A PSK of 'Summer2024!' will fall to dictionary attack in seconds. A randomly generated 20-character passphrase will resist indefinitely. The difference between these outcomes is entirely determined by PSK selection policy. |
WPA2-Enterprise with 802.1X authentication is significantly more secure than PSK — but it is not immune to attack. The most significant vulnerability in most WPA2-Enterprise deployments is not a flaw in the protocol itself but a misconfiguration in how client devices validate the authentication server's certificate. This misconfiguration is the foundation of the evil twin attack — one of the most effective techniques in wireless penetration testing.
A rogue access point is an unauthorised wireless access point connected to the corporate network — whether placed deliberately by an attacker or inadvertently by an employee who wanted better Wi-Fi coverage in their office. Either way, the result is the same: an uncontrolled, unmonitored entry point into the wired network that bypasses all perimeter security controls.
During wireless penetration testing, we test for rogue access points in two ways. First, we scan the wireless environment to identify any access points that are not part of the organisation's authorised wireless infrastructure — by comparing detected access points against the organisation's inventory of managed devices, examining MAC address OUIs to identify consumer-grade hardware that would not be part of a corporate deployment, and identifying access points connected to the corporate network that do not appear in the wireless controller's management interface. Second, we test the organisation's ability to detect a rogue access point by deploying one ourselves (with authorisation) — connecting a small, discreet access point to an available network port and monitoring whether the wireless intrusion detection system, network access control, or IT security team identifies and responds to it.
The rogue access point test is frequently one of the most revealing findings in a wireless assessment. Many organisations have no capability to detect rogue access points — no wireless intrusion detection, no 802.1X port authentication on wired ports (which would prevent an unauthorised device from connecting to the network), and no process for periodically surveying the wireless environment. A £30 consumer access point plugged into a network port under a desk can provide an attacker with persistent, undetected wireless access to the corporate LAN — bypassing firewalls, VPNs, and every other perimeter control.
Wireless attacks do not only target the access point infrastructure. Client devices — laptops, phones, tablets — present their own attack surface, particularly through the behaviour of their wireless supplicant (the software that manages Wi-Fi connections).
Compromising a wireless network is only the first step. The business impact depends entirely on what the attacker can reach once connected. A wireless network that provides internet access but no route to internal resources represents a minimal risk even if compromised. A wireless network that provides direct access to the corporate LAN, Active Directory, file servers, and applications containing sensitive data represents a critical risk.
Network segmentation testing is therefore the most important phase of any wireless penetration test. Once connected to each wireless network (corporate, guest, IoT, BYOD), we systematically test what can be reached:
| Test | What We Assess | Common Findings |
|---|---|---|
| VLAN Isolation | Whether the wireless VLAN is properly isolated from the corporate LAN, server VLANs, management VLANs, and other network segments. We test for VLAN hopping, inter-VLAN routing that should not exist, and firewall rules that permit traffic between wireless and restricted segments. | Guest wireless VLANs with routes to internal servers. Corporate wireless on the same VLAN as the wired LAN (no segmentation at all). Firewall rules that permit wireless-to-server traffic for 'convenience' that was never revoked. |
| Service Accessibility | Which services are accessible from the wireless network — Active Directory domain controllers, DNS servers, DHCP, file shares, printers, web applications, database servers, management interfaces, and cloud service endpoints. | Domain controllers reachable from the guest network. Printer management interfaces accessible from any wireless client. Internal web applications with no additional authentication beyond network access. |
| Client Isolation | Whether wireless clients can communicate with each other directly (peer-to-peer) or whether client isolation is enforced at the access point. Direct client communication enables ARP spoofing, traffic interception, and lateral movement between wireless devices. | Client isolation disabled on the corporate SSID, allowing any wireless client to intercept traffic from other wireless clients on the same network. |
| Internet Breakout | How wireless traffic reaches the internet — whether it traverses the corporate firewall (providing visibility to security monitoring), breaks out directly at the site (potentially bypassing security controls), or is tunnelled to a centralised internet gateway. | Guest network internet traffic that bypasses the corporate web proxy and its content filtering, logging, and malware scanning. |
| DNS and DHCP Intelligence | What information the DHCP and DNS services reveal about the internal network — domain names, server names, internal IP ranges, and service locations that inform further attack steps. | DHCP on the guest network that assigns addresses in the same range as the corporate LAN. DNS that resolves internal hostnames from the wireless network, revealing the internal server infrastructure. |
Wireless penetration testing requires specialist hardware and software beyond what is used in standard network or application testing. The following represents the core toolkit used during wireless engagements.
| Tool | Purpose | Role in Assessment |
|---|---|---|
| Alfa AWUS036ACH / AWUS036ACSM | External USB wireless adapters with chipsets that support monitor mode and packet injection — essential capabilities that most built-in laptop Wi-Fi adapters do not provide. | The foundation of wireless testing. Without an adapter that supports monitor mode, passive reconnaissance and most active attacks are not possible. |
| Aircrack-ng Suite | A comprehensive suite of tools for wireless auditing: airmon-ng (monitor mode), airodump-ng (packet capture), aireplay-ng (deauthentication and injection), and aircrack-ng (WPA handshake cracking). | The core toolset for wireless reconnaissance, handshake capture, and WPA-PSK cracking. Used in virtually every wireless engagement. |
| Hashcat | GPU-accelerated password cracking tool supporting WPA2-PSK handshakes, PMKID hashes, MSCHAPv2 challenge-response hashes, and many other hash types. | Offline cracking of captured WPA2-PSK handshakes and enterprise credentials. GPU acceleration provides orders-of-magnitude performance improvement over CPU-based cracking. |
| hostapd-wpe / EAPHammer | Modified hostapd (host access point daemon) configured to act as a rogue access point with a rogue RADIUS server for capturing WPA2-Enterprise credentials during evil twin attacks. | The primary tool for evil twin attacks against WPA2-Enterprise networks. Captures MSCHAPv2 challenge-response hashes from clients that do not properly validate the RADIUS server certificate. |
| Kismet | Wireless network detector, sniffer, and intrusion detection system. Provides comprehensive passive monitoring of the wireless environment across multiple channels simultaneously. | Used for continuous passive monitoring during the reconnaissance phase and for detecting wireless anomalies throughout the engagement. |
| hcxdumptool / hcxtools | Specialist tools for capturing PMKID hashes from WPA2-PSK access points without requiring a connected client or deauthentication attacks. | Enables the PMKID harvesting attack — a stealthier alternative to traditional handshake capture that works even when no clients are connected. |
| Wireshark | Network protocol analyser for detailed inspection of captured wireless frames — 802.11 management frames, EAP exchanges, authentication handshakes, and associated traffic. | Used for deep analysis of captured traffic, troubleshooting attack techniques, and documenting evidence of successful exploitation. |
The findings from wireless penetration testing translate directly into actionable security improvements. The following recommendations represent the controls that, based on our engagement experience, have the greatest impact on reducing wireless security risk.
Corporate wireless networks extend the organisation's attack surface beyond its physical perimeter and into space it does not control. An attacker positioned within radio range — in a car park, a neighbouring building, or the street — can discover wireless networks, capture authentication material, deploy rogue access points, and, if the wireless infrastructure is poorly configured, gain access to the corporate network without entering the building or triggering a single physical security control.
Wi-Fi penetration testing assesses this risk using the same techniques a real attacker would employ — passive reconnaissance, handshake and PMKID capture, evil twin deployment against WPA2-Enterprise, rogue access point testing, client-side attacks, and post-association segmentation testing. The findings reveal not just whether the wireless network can be compromised, but what an attacker can reach once they are connected — which is ultimately the measure of risk that matters.
The most impactful defences are well understood and achievable: WPA2/WPA3-Enterprise with enforced certificate validation defeats the evil twin attack that is the single most effective technique against corporate wireless. Strong segmentation limits what an attacker can reach even if they compromise the wireless. Protected Management Frames prevent deauthentication attacks. Wireless intrusion detection provides visibility into threats that ground-based physical security cannot see. And wired 802.1X prevents rogue access points from bridging the gap between the wireless threat and the wired network. The wireless network is an extension of your corporate network — and it deserves the same rigour, the same testing, and the same investment in security as any other component of your infrastructure.
Our wireless penetration testing assesses your corporate Wi-Fi from the attacker's perspective — testing authentication, segmentation, detection, and the full attack chain from the pavement to the domain controller.