OWISAM Discovery (OWISAM-DI)
The device identification step is the most important on any security analysis, but overall on Wi-Fi networks. This is because identify the communication stations and the relationships between them is a priority for starting to evaluate the existing risks.
Active and passive monitorization tools must be used to detect and classify the networks, supporting itselves on GPS technologies so we can map the information.
The next controls have been defined for the discovering step:
Reference | Test | Vulnerability |
---|---|---|
OWISAM-DI-001 | Discovering of access points. | Existence of rogue APs. |
OWISAM-DI-002 | Hidden networks discovering. | Firmware weakness and security through obscurity. |
OWISAM-DI-003 | Passive MAC address identification. | Unauthorized devices. |
OWISAM-DI-004 | Discovering of clients' Preferred Network Lists (PNL). | Automatic connection to insecure networks. |
OWISAM-DI-005 | Active device and network discovering. | Information discovering. |
OWISAM-DI-006 | Identification of relationships between devices. | Information discovering. |
Return to controls list.