Revision as of 23:14, 13 May 2018 by Adm owisam (talk | contribs) (Página creada con «Return to controls list.»)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

The device identification step is the most important on any security analysis, but overall on Wi-Fi networks. This is because identify the communication stations and the relationships between them is a priority for starting to evaluate the existing risks.

Active and passive monitorization tools must be used to detect and classify the networks, supporting itselves on GPS technologies so we can map the information.

The next controls have been defined for the discovering step:

Reference Test Vulnerability
OWISAM-DI-001 Discovering of access points. Existence of rogue APs.
OWISAM-DI-002 Hidden networks discovering. Firmware weakness and security through obscurity.
OWISAM-DI-003 Passive MAC address identification. Unauthorized devices.
OWISAM-DI-004 Discovering of clients' Preferred Network Lists (PNL). Automatic connection to insecure networks.
OWISAM-DI-005 Active device and network discovering. Information discovering.
OWISAM-DI-006 Identification of relationships between devices. Information discovering.

Return to controls list.