I've been asked to perform a vulnerability test on the wireless network. The company's managing director has deliberately...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
not given me any information about the wireless network or the internal company network as he wishes to know how much information can be obtained by outsiders. What are the most appropriate best practices to keep in mind so that I perform a comprehensive vulnerability assessment without crossing any unethical boundaries?
First and foremost, make sure the external penetration testing is legal. Get written authorization in order to perform the assessment. If you are an outside contractor, this authorization should be part of your contract or statement of work. It is important that the authorization be as detailed as possible to avoid legal or ethical issues; details to include are the allowed dates (and times if relevant) of the assessment, which attacks are permitted and, more importantly, which ones are not permitted. Also, you should document whether or not you are allowed to attack the access points and/or devices attached to the wireless network directly, or if the goal is just to break the authentication and authorization protocols/policies.
Often, attacks that can create denial-of-service conditions are disallowed. Similarly, it is important to document how far you are allowed to test if you find a wireless network vulnerability. For instance, if you manage to connect to the network, are you allowed to see what services are available? And if so, are you limited to the ones directly on the wireless network or are you permitted to attack services on any attached wired networks?
Unless this is also supposed to test the effectiveness of the infosec team's monitoring techniques, all external penetration testing should go through the client's change-control system so that the appropriate people are aware of the situation and can react appropriately should your testing cause any issues.
It is also important to document what tests you ran and the results of those tests so you can cleanly and accurately report the results back to the organization.
- Read more about ethical hacking techniques for standard penetration testing.
- Are Web application penetration tests still important? Find out more.
Dig Deeper on Security Testing and Ethical Hacking
Related Q&A from David Mortman
While IT security consultancies can be helpful when trying to find flaws in an information security management framework, there are ways to do it ...continue reading
PCI DSS audits can be a lot easier if the scope is narrow. Learn how to consolidate and store sensitive data in order to best reduce PCI DSS security...continue reading
When hiring an information security team member, how important is a certification in information security? Learn how to talk to executives about ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.