• Twitter
  • LinkedIn
  • 306-205-1121
  • info@rsolutions.com
rSolutions
  • Home
  • About Us
  • Cybersecurity
    • Managed Cybersecurity Services
    • Professional Cybersecurity Services
    • Sales & Licensing
  • Partners
  • Blog
  • Careers
  • Get in Touch
  • Search
  • Menu Menu

Wireless Vulnerability Assessment

Identifies weaknesses or vulnerabilities in wireless access points (WAPs) and wireless authentication.

A Wireless Vulnerability Assessment will also validate the strength of encryption wireless protection controls.

The assessment includes:

  • Foot printing in-scope access points
  • Identification of wireless and SSIDs, access point vendors
  • Attempts to recover encryption keys
  • Passive session hijacking attempts
  • Man-in-the-middle attacks to gain network access
  • Impersonation attacks
  • Decryption of encrypted wireless network traffic
  • Validation of access point authentication and authorization controls
  • Assessing the risk of identified vulnerabilities
  • Prioritizing the vulnerabilities and providing solutions where possible.

Latest News

  • Detect. Analyze. Prioritize. Take your time back with XDR. Detect. Analyze. Prioritize. Take your time back with XDR. June 29, 2022 - 9:12 am
  • cybernews interview with Richard Baker“If it sounds too good to be true, it probably is” Richard Baker’s Interview by CyberNewsJune 4, 2022 - 9:59 am
  • Seven things to consider in CybersecurityJanuary 21, 2021 - 10:34 am
  • Filling the Cyber Security Skills GapJune 17, 2017 - 1:51 pm

Skip to Section

rSolutions CorporationVisibility Drives Action
Logo image
Follow Us
Computer & Network Security • Regina, Saskatchewan • 300+ followers

Who We Are

  • About rSolutions
  • Our Partners
  • Our Blog
  • Contact Us

What We Do

  • Professional Services
  • Managed Security
  • Sales & Licensing
  • Trellix XDR
  • Fortinet Security
  • Splunk Data Intel

What’s New?

June 29, 2022

Detect. Analyze. Prioritize. Take your time back with XDR. 

June 4, 2022

“If it sounds too good to be true, it probably is” Richard Baker’s Interview by CyberNews

January 21, 2021

Seven things to consider in Cybersecurity

Link to: Get in Touch
  • Vancouver
  • Edmonton
  • Calgary
  • Regina
  • Winnipeg
  • Toronto
  • Ottawa
  • Halifax
© rSolutions | Made with ♥ by Strategy Lab
  • Twitter
  • LinkedIn
  • Home
  • About
  • Services
  • Partners
  • Blog
  • Contact
  • Staff Login
Mobile or Web Application Security AssessmentSocial Engineering Scroll to top