{"id":1433,"date":"2022-01-09T15:34:01","date_gmt":"2022-01-09T14:34:01","guid":{"rendered":"https:\/\/www.dsecbypass.com\/wi-fi-pentest\/"},"modified":"2024-07-19T09:58:38","modified_gmt":"2024-07-19T07:58:38","slug":"wi-fi-pentest","status":"publish","type":"page","link":"https:\/\/www.dsecbypass.com\/en\/wi-fi-pentest\/","title":{"rendered":"Wi-Fi Penetration Test"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; next_background_color=&#8221;#101535&#8243; admin_label=&#8221;Hero Section&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#101535&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#3d3fc7 0%|rgba(61,63,199,0) 100%&#8221; background_color_gradient_start=&#8221;#3d3fc7&#8243; background_color_gradient_end=&#8221;rgba(61,63,199,0)&#8221; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto-bg-02b.png&#8221; parallax=&#8221;on&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;||0px||false|false&#8221; bottom_divider_style=&#8221;wave&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;Wi-Fi Pentest&#8221; text_orientation=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; title_font=&#8221;Titillium Web||||||||&#8221; title_font_size=&#8221;66px&#8221; title_line_height=&#8221;1.5em&#8221; content_font=&#8221;||||||||&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;2em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(16,21,53,0) 50%|#101535 100%&#8221; background_color_gradient_start=&#8221;rgba(16,21,53,0)&#8221; background_color_gradient_start_position=&#8221;50%&#8221; background_color_gradient_end=&#8221;#101535&#8243; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;13px&#8221; button_one_text_color=&#8221;#4328b7&#8243; button_one_bg_color=&#8221;#ffffff&#8221; button_one_border_width=&#8221;10px&#8221; button_one_border_color=&#8221;#ffffff&#8221; button_one_border_radius=&#8221;0px&#8221; button_one_letter_spacing=&#8221;2px&#8221; button_one_font=&#8221;Titillium Web|700||on|||||&#8221; custom_button_two=&#8221;on&#8221; button_two_text_size=&#8221;13px&#8221; button_two_text_color=&#8221;#4328b7&#8243; button_two_bg_color=&#8221;#ffffff&#8221; button_two_border_width=&#8221;10px&#8221; button_two_border_color=&#8221;#ffffff&#8221; button_two_border_radius=&#8221;0px&#8221; button_two_letter_spacing=&#8221;2px&#8221; button_two_font=&#8221;Titillium Web|700||on|||||&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|||&#8221; child_filter_blur=&#8221;-2px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_intensity_slide=&#8221;2%&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;40px&#8221; title_font_size_phone=&#8221;&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; content_font_size_phone=&#8221;15px&#8221; content_font_size_last_edited=&#8221;on|phone&#8221; title_text_shadow_style=&#8221;preset3&#8243; border_radii_image=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style_image=&#8221;preset6&#8243; button_one_letter_spacing_hover=&#8221;2px&#8221; button_two_letter_spacing_hover=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;2px&#8221; button_two_letter_spacing__hover_enabled=&#8221;on&#8221; button_two_letter_spacing__hover=&#8221;2px&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_one_text__hover_enabled=&#8221;off|desktop&#8221; child_filter_hue_rotate__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Description 2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;0px||0px||true|false&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_starting_opacity=&#8221;2%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span> <\/span><br \/><span> <\/span><br \/><span> <\/span><br \/>A <strong>pentest<\/strong> carried out on the company&#8217;s wireless access.<\/p>\n<p>The auditor moves around the premises, or to the periphery, so as to be able to enter the internal network by bypassing <span>the<\/span> <strong>security of Wi-Fi networks<\/strong>.<\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/audit_wifi_v1.png&#8221; alt=&#8221;Fond vecteur cr\u00e9\u00e9 par macrovector &#8211; fr.freepik.com&#8221; title_text=&#8221;audit wifi&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Attaques&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; background_enable_image=&#8221;off&#8221; background_position=&#8221;top_center&#8221; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"dans-quels-cas-choisir-l-audit-de-site-web\"><strong>Examples of attacks and checks carried out<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,3_5,1_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; animation_style=&#8221;fold&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Separation between employee and guest networks&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x4e;||divi||400&#8243; icon_color=&#8221;#3c3cc8&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;7px||7px||true|false&#8221; custom_padding=&#8221;15px|16px|15px|16px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Isolation between devices&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x4e;||divi||400&#8243; icon_color=&#8221;#3c3cc8&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;7px||7px||true|false&#8221; custom_padding=&#8221;15px|16px|15px|16px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Analysis and identification of surrounding Wi-Fi networks&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x4e;||divi||400&#8243; icon_color=&#8221;#3c3cc8&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;7px||7px||true|false&#8221; custom_padding=&#8221;15px|16px|15px|16px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Guests management&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x4e;||divi||400&#8243; icon_color=&#8221;#3c3cc8&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;7px||7px||true|false&#8221; custom_padding=&#8221;15px|16px|15px|16px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Bruteforce attack on shared keys&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf1e2;||fa||900&#8243; icon_color=&#8221;#3c3cc8&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;7px||7px||true|false&#8221; custom_padding=&#8221;15px|16px|15px|16px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Wi-Fi networks impersonation (Rogue AP \/ Evil Twin)&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf1e2;||fa||900&#8243; icon_color=&#8221;#3c3cc8&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;7px||7px||true|false&#8221; custom_padding=&#8221;15px|16px|15px|16px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Security vulnerabilities on captive portals&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf666;||fa||900&#8243; icon_color=&#8221;#3c3cc8&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;7px||7px||true|false&#8221; custom_padding=&#8221;15px|16px|15px|16px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Types de scenarios&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span>Different <\/span><span>penetration testing <\/span><span>scenarios exist<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_width_px=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Black box&#8221; image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/Crypto_Icon_13.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(60,60,200,0.2)&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;30px|16px|30px|16px&#8221; animation_style=&#8221;fold&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328B7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<span>The consultant tries to connect to Wi-Fi networks (company or guest) without authorization.<\/span><br \/>\n<span> <\/span>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Grey box&#8221; image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/Crypto_Icon_13.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(60,60,200,0.2)&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;30px|16px|30px|16px&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;300ms&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328B7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The auditor has the Wi-Fi key and\/or an account on the Wi-Fi networks and ensures the tightness of the latter as well as compliance with good practices and security standards.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Use Cases&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"dans-quels-cas-choisir-l-audit-de-site-web\">In which cases should you choose the Wi-Fi penetration test?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||16px|false|false&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf0a1;||fa||900&#8243; icon_width=&#8221;130px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;|16px||16px|false|false&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">To ensure that an attacker or a former employee cannot access the Information System from a surrounding building.<\/p>\n<p style=\"text-align: justify;\">Verify that guest users of the wireless network do not have access to employee resources.<\/p>\n<p style=\"text-align: justify;\">Validate that the legal and regulatory aspects relating to the establishment of guest Wi-Fi networks are correctly applied.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Modalites&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"modalites-de-la-prestation\">Mission organization<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|16px||16px|false|true&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">An initiation meeting makes it possible to identify the needs and scope of the mission, as well as any constraints.<\/p>\n<p style=\"text-align: justify;\">In the majority of cases, a legal mandate is not necessary for this type of service.<\/p>\n<p style=\"text-align: justify;\">The consultant in charge of the mission can be reached at any time during its execution and informs the customer in the event of a critical discovery.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#x67;||divi||400&#8243; icon_width=&#8221;150px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Results&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"resultats-du-test-d-intrusion\">Penetration test results<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|16px||16px|false|true&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf681;||fa||900&#8243; icon_width=&#8221;150px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The deliverables of the mission include a report as well as two optional restitutions.<\/p>\n<p style=\"text-align: justify;\">The report includes a summary of the results as well as the details of the identified vulnerabilities and recommendations.<\/p>\n<p style=\"text-align: justify;\">The technical restitution is an opportunity for the consultant to present his approach and his results in an interactive way, and to discuss with the client and his teams on the action plan. Managerial restitution makes it possible to address an executive audience.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#101535&#8243; admin_label=&#8221;Contact&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#12163d 0%|#2b2996 100%&#8221; background_color_gradient_start=&#8221;#12163d&#8221; background_color_gradient_end=&#8221;#2b2996&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto-bg-02b.png&#8221; parallax=&#8221;on&#8221; top_divider_style=&#8221;arrow2&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8221; button_text=&#8221;Contact us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A pentest carried out on the company&#8217;s wireless access. The auditor moves around the premises, or to the periphery, so as to be able to enter the internal network by bypassing the security of Wi-Fi networks. Examples of attacks and checks carried outDifferent penetration testing scenarios existThe consultant tries to connect to Wi-Fi networks (company [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1200,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1433","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1433"}],"version-history":[{"count":26,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1433\/revisions"}],"predecessor-version":[{"id":3543,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1433\/revisions\/3543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media\/1200"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}