Wireless Penetration Testing

A wireless penetration test is a specialised subset of a traditional penetration test that purely focuses on the wireless component of an organisation's network. With millions of smart and other devices connecting to their corporate networks via wireless technology, a new range of attack vectors has evolved. A wireless signal can 'leak' outside of a secure premises, or an attacker can interact with the network from a remote location with the use of high-powered antennas.

Xiph Cyber uses specialised wireless testing techniques to simulate a malicious attack on your wireless network. After the test, we provide a report to assess your risk of using wireless technologies or insights on how to bolster your security program's implementation of this technology


  • Information Gathering
  • Port Scanning
  • Enumeration
  • Reconnaissance
  • Review of Cryptography
  • Exploitation
  • Vulnerability Analysis
  • Reporting
  • Social Engineering
  • OSINT Techniques
  • Mapping Networks

Explore all Xiph Cyber Security Services

  • Audit and Risk Management
    Audit and Risk Management

    Our in-depth assessments include a thorough audit of your existing cyber security systems and policies against a background of current threats. We identify your exposure and vulnerabilities and recommend appropriate changes to provide updated protection.

    Find out more
  • Consulting

    The cyber world moves quickly and circumstances can change daily. Having a Xiph Cyber consultant on your side means faster reactions, more precise compliance and access to the latest protection technology.

    Find out more
  • Cyber Education and Training
    Cyber Education and Training

    Your best defence against insidious attacks derived from cybercrime activities such as phishing is a knowledgeable company with a fresh and current understanding of the threats. We teach best-practice cyber management, social media safety, and threat identification and avoidance.

    Find out more
  • Email Security
    Email Security

    The overwhelming majority of cyber-attacks begin with a simple email. Keeping your email secure and your staff up to date on the sophisticated techniques malicious actors use to trick them into admitting malware and ransomware is essential. We stay abreast of current and emerging threats every day, so you don’t have to.

    Find out more
  • Ransomware Security
    Ransomware Security

    Ransomware attacks are becoming more prevalent all the time, and you need constant vigilance to detect and respond to this rising threat. From risk management and guidance to threat detection and intelligence, to attack response and mitigation, Xiph Cyber is the answer you need.

    Find out more
  • Virtual CISO
    Virtual CISO

    A Virtual Chief Information Security Officer (vCISO) is a dedicated service with the resources and expertise to work directly with your senior team to meet your goals regarding cyber security, and provide the guidance and leadership you need. Cost-effective and focused solely on cyber protection, your vCISO is available 24/7/365 – because cyber criminals never sleep.

    Find out more