Jump to: navigation, search
This page is a translated version of the page Descubrimiento de dispositivos OWISAM-DI and the translation is 100% complete.

The device identification step is the most important on any security analysis, but overall on Wi-Fi networks. This is because identify the communication stations and the relationships between them is a priority for starting to evaluate the existing risks.

Active and passive monitorization tools must be used to detect and classify the networks, supporting itselves on GPS technologies so we can map the information.

The next controls have been defined for the discovering step:

Reference Test Vulnerability
OWISAM-DI-001 Discovering of access points. Existence of rogue APs.
OWISAM-DI-002 Hidden networks discovering. Firmware weakness and security through obscurity.
OWISAM-DI-003 Passive MAC address identification. Unauthorized devices.
OWISAM-DI-004 Discovering of clients' Preferred Network Lists (PNL). Automatic connection to insecure networks.
OWISAM-DI-005 Active device and network discovering. Information discovering.
OWISAM-DI-006 Identification of relationships between devices. Information discovering.

Return to controls list.