OWISAM Discovery (OWISAM-DI)
Revision as of 23:14, 13 May 2018 by Adm owisam (talk | contribs) (Página creada con «Return to controls list.»)
The device identification step is the most important on any security analysis, but overall on Wi-Fi networks. This is because identify the communication stations and the relationships between them is a priority for starting to evaluate the existing risks.
Active and passive monitorization tools must be used to detect and classify the networks, supporting itselves on GPS technologies so we can map the information.
The next controls have been defined for the discovering step:
Reference | Test | Vulnerability |
---|---|---|
OWISAM-DI-001 | Discovering of access points. | Existence of rogue APs. |
OWISAM-DI-002 | Hidden networks discovering. | Firmware weakness and security through obscurity. |
OWISAM-DI-003 | Passive MAC address identification. | Unauthorized devices. |
OWISAM-DI-004 | Discovering of clients' Preferred Network Lists (PNL). | Automatic connection to insecure networks. |
OWISAM-DI-005 | Active device and network discovering. | Information discovering. |
OWISAM-DI-006 | Identification of relationships between devices. | Information discovering. |
Return to controls list.