I assess wireless network security including PSK strength via offline cracking, PMKID attacks, evil twin simulation, rogue AP detection, guest network segmentation validation, and enterprise EAP/PEAP authentication weaknesses.
WPA2 PSK testing: handshake and PMKID capture; offline cracking using Hashcat with GPU acceleration, custom wordlists, and rule-based mangling; pre-shared key strength assessment. WPA2/3 Enterprise testing: PEAP certificate validation testing; GTC downgrade attacks; credential interception via rogue RADIUS server; MSCHAPv2 capture and offline cracking.
Network architecture testing: evil twin AP simulation for captive portal credential harvesting; rogue AP detection; SSID broadcast enumeration; guest-to-corporate network segmentation validation; deauthentication attack susceptibility.
For on-site engagements I bring my own wireless assessment hardware. Remote Basic testing works from pre-captured PCAP/PMKID files you collect using standard hardware. Requires written authorization. Share your SSID list, auth type (PSK or Enterprise), and whether on-site or remote engagement.