Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done wired (via cable, aka Ethernet) or wirelessly (Wi-Fi). Our focus in this paper is primarily concerned with the Wi-Fi network. We demonstrate how using Wi-Fi can be dangerous if not correctly configured or if the end-user does not pay special attention to the service set identifier (SSID) he is about to connect his device to.
A Wi-Fi network’s security depends on the protocol used in the configuration by its administrator, while the other main dependency is on the human who uses the wireless network for connection. Of course, there are a lot of other weaknesses; but in this article, we will be emphasizing those two. We show how to make a Wi-Fi penetration testing, what it entails, its importance, and why a company should regularly perform Wi-Fi penetration testing.
From a security perspective, we also demonstrate the importance of protocols that should be used in the Wi-Fi network configuration, the importance of respecting the password policy requirements, and finally, the role of the client’s operating system can play in jeopardizing and leaking the Wi-Fi password. In the end, we briefly elaborated on the importance of applying an ontology-based approach to the network.