Low-level assessment of wireless network AP configuration in public areas
Denial of service attack emulation to assess defensive strategy
Rogue Access Point discovery
Review of policy and procedures dictating the use of wireless devices
Emulation of an attacker performing brute force attack and audit on wireless security protocol on your deployed wireless network