Sherlocked Security – Wireless Security & Rogue Access Point (AP) Detection
Secure the Airwaves: Prevent Wireless Threats and Rogue Access
1. Statement of Work (SOW)
Service Name: Wireless Security Assessment & Rogue AP Detection
Client Type: Enterprises, Healthcare, Education, Retail, Critical Infrastructure
Service Model: Assessment & Threat Detection / Continuous Monitoring
Compliance Alignment: PCI-DSS, HIPAA, NIST 800-53, ISO/IEC 27001, CIS v8 (Control 13 & 14)
Wireless Security Services Cover:
- Wireless network architecture review
- Detection of rogue and unauthorized APs
- Weak encryption and misconfiguration detection
- Wireless segmentation validation
- Wireless IDS/IPS integration
- Site survey and RF analysis
- Policy, visibility, and monitoring enhancements
2. Our Approach
[RF Spectrum Mapping] → [Wireless Policy Review] → [Attack Surface Discovery] → [Rogue AP Hunt] → [Remediation Planning] → [Continuous Monitoring Setup]
3. Methodology
- Wireless Network Discovery: Scan and map all visible SSIDs, BSSIDs, channels, and signal strengths.
- Rogue AP Detection: Identify APs spoofing enterprise SSIDs or not managed by corporate systems.
- Client Association Analysis: Detect users connecting to unauthorized or insecure APs.
- Encryption & Auth Review: Check for weak WPA2/WPA3 configurations, open networks, and default credentials.
- Segmentation Validation: Confirm guest networks are isolated from internal segments.
- Site Survey (Optional): Conduct RF walk-through to map coverage, interference, and signal bleed.
- Wireless IDS/IPS Review: Evaluate existing wireless threat detection capabilities.
- Threat Simulation: Optional wireless attack simulations (evil twin, deauth, WPA handshake capture).
- Remediation & Governance: Recommend policy, configuration, and monitoring improvements.
4. Deliverables to the Client
- Wireless Threat Assessment Report
- Rogue AP Discovery Log
- SSID Mapping & Risk Rating
- Wireless Policy Gap Analysis
- RF Site Survey Report (if applicable)
- Encryption & Auth Findings
- Client Device Risk Summary
- Remediation Plan (short-term & long-term)
- Monitoring & Governance SOP
- Wireless Security Hardening Guide
5. What We Need from You (Client Requirements)
- SSID/Network Inventory: List of approved SSIDs, VLAN mappings, and authentication types
- Wireless Controller Access: Credentials or exports from Cisco, Aruba, Meraki, etc.
- Physical Access (if on-site): For RF walk-throughs and access point inspections
- Security Policies: Existing wireless access and guest network policies
- Floor Plans: Optional for RF survey and AP location verification
- Compliance Requirements: Standards requiring wireless security (e.g., PCI-DSS 4.2, HIPAA 164.312)
6. Tools & Technology Stack
- Wireless Scanning & Assessment:
- Aircrack-ng, Kismet, WiFi Explorer, Acrylic Wi-Fi, Ekahau, NetSpot
- Rogue AP Detection:
- Kismet, WIDS/WIPS platforms (e.g., Cisco MSE, Aruba AirWave, FortiWLC, Mist)
- Protocol/Encryption Analysis:
- Wireshark, hcxdumptool, EAPOL capture utilities
- Monitoring/Logging:
- Syslog, SIEM (Splunk, Sentinel), WLC logs
- Wireless Controllers Supported:
- Cisco WLC, Aruba, Meraki, Fortinet, Ubiquiti, Mist
- Compliance Mappings:
- PCI-DSS, HIPAA, NIST 800-53 AC-18, CIS v8 Control 13.3/14.4
7. Engagement Lifecycle
-
Scoping & Kickoff
- Define wireless network footprint, business use, and compliance drivers
-
Passive & Active Scanning
- Detect SSIDs, rogue APs, open networks, misconfigured clients
-
Policy & Architecture Review
- Assess security configurations, authentication, segmentation
-
Threat Simulation (Optional)
- Execute simulated attacks to test detection and response
-
Site Survey & Spectrum Mapping
- Identify bleed-over, interference zones, signal coverage gaps
-
Findings & Recommendations
- Deliver risk ratings, remediation plans, and hardening strategies
-
Monitoring & Governance Setup
- SOPs for rogue detection, incident response, and logging
8. Why Sherlocked Security?
Feature | Sherlocked Advantage |
---|---|
Rogue AP Expertise | Deep experience in enterprise rogue AP detection and mitigation |
Tool-Agnostic Methodology | Uses both commercial and open-source tools for broad visibility |
Compliance-Focused | Aligns findings with PCI-DSS, HIPAA, NIST, and industry mandates |
Hands-On Testing | Offers real-world wireless threat simulation, not just passive scans |
Governance Emphasis | Includes SOPs and governance frameworks, not just tech fixes |
9. Real-World Case Studies
Retail Chain – Rogue AP Audit
Client: National retail chain with 200+ locations
Problem: Corporate SSID was being spoofed in public malls near stores
Solution: Conducted passive scans, deployed WIDS sensors at select locations
Outcome: Identified over 50 rogue APs, updated staff access policies, enforced MAC filtering
University Campus – Wireless Segmentation Audit
Client: Large university with 50K+ users
Problem: Guest Wi-Fi allowed partial access to internal services
Solution: Wireless VLAN redesign and policy enforcement review
Outcome: Implemented proper guest segmentation, reducing internal attack surface
10. SOP – Standard Operating Procedure
-
Pre-Assessment
- Gather list of approved SSIDs, APs, and controller configs
- Define wireless zones (guest, corp, IoT, etc.)
-
Discovery & Scanning
- Use passive and active scanning to enumerate all SSIDs and APs
- Identify APs not in authorized inventory
-
Rogue AP Detection & Validation
- Validate MAC spoofing, rogue APs, or evil twin setups
- Cross-check against controller/AP inventory
-
Client Association Analysis
- Detect users connecting to unauthorized APs
- Identify potential credential theft risks
-
Policy & Encryption Review
- Review auth methods (PSK, EAP-TLS, etc.) and encryption (WPA2/WPA3)
- Identify misconfigurations or weak implementations
-
Site Survey (if included)
- Walk-through with RF scanner to map coverage, noise, interference
-
Findings & Remediation
- Report with prioritized issues and hardening steps
- Includes guest network isolation, WIDS/WIPS enhancements
-
Ongoing Monitoring Setup
- Deploy or tune rogue detection sensors
- Configure alerting and log correlation with SIEM
11. Wireless Security Checklist
1. Before Engagement
- [ ] Provide wireless architecture documents
- [ ] List known SSIDs and controller platforms
- [ ] Share previous wireless audits or logs
- [ ] Floor plans for survey (if applicable)
2. During Engagement
- [ ] Perform passive and active scans
- [ ] Validate rogue APs and associated clients
- [ ] Test encryption/auth configs
- [ ] Assess segmentation effectiveness
- [ ] Conduct RF walk-through (optional)
3. After Engagement
- [ ] Review remediation plan and apply changes
- [ ] Tune wireless controller security settings
- [ ] Train staff on rogue AP risks
- [ ] Enable monitoring alerts in SIEM or controller
4. Continuous Improvement
- [ ] Schedule periodic wireless assessments
- [ ] Automate rogue detection via controller/WIDS
- [ ] Review access logs for anomalies
- [ ] Update wireless access policy annually
- [ ] Conduct periodic training for network and security teams