cybersecurity related images

Wireless Network Vulnerability Scanning

Test your wireless network for exploitable vulnerabilities before our adversaries do

The Wireless Network Vulnerability Scanning service includes:

  • Wireless scan(s) at the customer's designated location
  • An analysis, classification, and record of detected wireless devices
  • A review of each access point to determine detectable weaknesses (i.e., default/weak password check)
  • A comprehensive report that identifies all discovered wireless devices
  • For each device detected, the report will contain the Service Set Identifiers (SSID), the Media Access Control (MAC) address of the device, the wireless channel the device is operating on, what type of security/encryption the device is using, and the approximate physical location of said device

Note: This is typically a subset of our Penetration Testing services but can be provided as a standalone offering, depending on the customer's requirements.

For each device detected, the report will contain the type of signal detected, the Media Access Control (MAC) address of the device, the wireless channel the device is operating on, what type of security/encryption the device is using, and the Global Positioning System (GPS) location of said device.

Eligibility

Federal civilian agencies are eligible to use these cybersecurity services from the DOT Enterprise Services Center (ESC). Department of Defense (DOD) organizations may be eligible for ESC cybersecurity services if their systems are unclassified.

Interested in this Fed-to-Fed service? Get a quote!

To get started, reach out to the ESC team. We will send you a simple questionnaire to fill out. Return the completed questionnaire to us and we will promptly develop a firm fixed-price quote, to include proposed schedules. If you just need a rough order of magnitude (ROM) estimate for budget planning purposes, just let us know.

Contact ESC at CyberServices@esc.gov to get more information and assistance.