This test intends to analyze the wireless devices deployed on the client site. The list of devices include items like tablets, laptops, notebooks, iPods, smartphones, etc. Apart from the gadgets, the penetration tester should consider preparing tests for the following.
- Protocols used for configuring Wireless – It’ll help find out the weak areas.
- Access points for Wireless setup – It’ll enable in identifying the ones violating the access rights.
Usually, such tests should take place at the customer end. The hardware used to run pen tests need to connect with the wireless system for exposing vulnerability.