First and foremost, make sure the external penetration testing is legal. Get written authorization in order to perform the assessment. If you are an outside contractor, this authorization should be part of your contract or statement of work. It is important that the authorization be as detailed as possible to avoid legal or ethical issues; details to include are the allowed dates (and times if relevant) of the assessment, which attacks are permitted and, more importantly, which ones are not permitted. Also, you should document whether or not you are allowed to attack the access points and/or devices attached to the wireless network directly, or if the goal is just to break the authentication and authorization protocols/policies.
Often, attacks that can create denial-of-service conditions are disallowed. Similarly, it is important to document how far you are allowed to test if you find a wireless network vulnerability. For instance, if you manage to connect to the network, are you allowed to see what services are available? And if so, are you limited to the ones directly on the wireless network or are you permitted to attack services on any attached wired networks?
Unless this is also supposed to test the effectiveness of the infosec team's monitoring techniques, all external penetration testing should go through the client's change-control system so that the appropriate people are aware of the situation and can react appropriately should your testing cause any issues.
It is also important to document what tests you ran and the results of those tests so you can cleanly and accurately report the results back to the organization.
For more information:
- Read more about ethical hacking techniques for standard penetration testing.
- Are Web application penetration tests still important? Find out more.
This was first published in June 2009