NetArmor Sdn. Bhd. | Wireless Security Assessment
Introduction of NetArmor Sdn. Bhd.

NetArmor is a premier Managed Security Services Provider (MSSP) based in Singapore with offices in Malaysia that specialises in channel-driven cyber security solutions.

Led by industry experts, we’re committed towards empowering businesses and fortifying regional cybersecurity through our AI-driven, scalable solutions.

We work closely with resellers, Managed Service Providers (MSPs), and IT partners to ensure that the services provided meet our three criteria of quality: enterprise-grade protection, seamless operations, and adaptive in face of evolving cyber threats.

Wireless Security Assessment
Evaluates the security of an organization’s Wi-Fi infrastructure by identifying vulnerabilities, misconfigurations, and insecure protocols that could allow unauthorized access or data interception. Access Point Discovery & Rogue Device Detection: Identifies all authorized and unauthorized wireless devices in the environment. Encryption & Protocol Analysis: Assesses use of WPA2/WPA3, EAP methods, and identifies weak or outdated protocols. Authentication & Access Control Testing: Evaluates security of credentials, captive portals, and 802.1X implementations. Man-in-the-Middle & Eavesdropping Simulation: Tests resistance to traffic interception and session hijacking. Signal Coverage & Leakage Analysis: Identifies signal bleed and risks of external access from outside secure zones. Guest Network & Segmentation Review: Ensures proper isolation between guest and internal corporate networks. Compliance Support: Helps meet wireless-related controls in standards like PCI-DSS, ISO 27001, and HIPAA.

Purpose: The primary goal is to ensure the confidentiality, integrity, and availability of your wireless network and associated systems.

Scope: Wireless access points (APs) and controllers, wireless client devices (laptops, mobile devices, printers, etc.), wireless encryption protocols (WEP, WPA2, WPA3), authentication mechanisms (PSK, EAP, RADIUS), guest Wi-Fi and BYOD networks, physical signal footprint and broadcast range, wireless IDS/IPS (if implemented).

Methodology: Testers perform a series of tests, starting with reconnaissance to identify all active wireless networks. Next, assess the encryption and authentication mechanisms, test for weak passwords or misconfigurations, and attempt to exploit vulnerabilities like weak encryption (WEP, WPA). 

Types of Penetration Tests:

Black Box: Testing with no prior knowledge of the network.

Grey Box: Limited knowledge of network setup or credentials.

White Box: Full access to network information or configurations.

CLICK HERE to view the detailed user guide for more information. For more information about the product, please visit the Product Page.