| Maximum network discovery and fingerprinting distance with: |
| Built-in client card antenna | ___ | 12 dBi omnidirectional | ___ |
| 15 dBi Yagi | ___ | 19 dBi directional | ___ |
| ESSID security |
| default |  | company name |  |
| closed |  | address |  |
| other relevant information | ______________________________ |
| Bypassing closed ESSID |
| closed ESSID value | ______________________________ |
| Bypassing MAC filtering |
| success with MAC | ______________________________ |
| Cracking WEP keys |
| key 1 | ______________________________ |
| key 2 | ______________________________ |
| key 3 | ______________________________ |
| key 4 | ______________________________ |
| cracking time | ___ | cracking tool | ___ |
| WEP cracking acceleration |  | time saved | ___ |
| traffic injection tool | ___ | type of traffic injected | ___ |
| Brute-forcing 802.1x access |
| password guessed | ______________________________ |
| Other 802.1x attacks | Comments | ______________________________ |
| Wireless man-in-the-middle attacks |  | | | Tool _________________ |
| layer 1 attack (comments) | ______________________________ |
| layer 2 attack (comments) | ______________________________ |
| DoS attack resilience / detection (comments) | |
| deauthentication flood | ______________________________ | | | | |
| deassociation flood | ______________________________ | | | | |
| malformed frames flood | ______________________________ | | | | |
| excessive beacon flood | ______________________________ | | | | |
| authentication flood | ______________________________ | | | | |
| probe requests flood | ______________________________ | | | | |
| Other attacks | ______________________________ | | | | |
| Wireless traffic interception / analysis | | | | |
| packets per minute | ___ | | | | |
| plaintext and plaintext authentication protocols detected |  | | | | |
| POP3 |  | Telnet |  | | | | |
| SMTP |  | FTP |  | | | | |
| IMAP |  | HTTP |  | | | | |
| NNTP |  | Instant messengers |  | | | | |
| IRC |  | SQL |  | | | | |
| PAP |  | LDAP |  | | | | |
| Other | ______________________________ | | | | |
| passwords/user credentials collected | | | | |
| username/password | ______________________________ | | | | |
| username/password | ______________________________ | | | | |
| username/password | ______________________________ | | | | |
| username/password | ______________________________ | | | | |
| weak encryption/vulnerable protocols detected | | | | |
| LM/ NTLMv1 |  | SSHv1 |  | | | | |
| Other | ______________________________ | | | | |
| passwords cracked | | | | |
| username/password | ______________________________ | | | | |
| username/password | ______________________________ | | | | |
| username/password | ______________________________ | | | | |
| username/password | ______________________________ | | | | |
| UNIX remote services | ___ | type | ___ |
| SMB shares on WLAN | ______________________________ |
| NFS shares detected | ______________________________ |
| DHCP traffic detected | ______________________________ |
| HSRP/VRRP traffic detected | ______________________________ |
| HSRP password | ______________________________ |
| VRRP authentication | ______________________________ |
| VRRP password | ______________________________ |
| CDP traffic detected | ______________________________ |
| CDP data gathered | ______________________________ |
| ICMP type 9/10 implementation |  | RIPv1 running |  |
| Unauthenticated routing protocols over wireless network |
| RIPv2 |  | OSPF |  |
| IGRP |  | EIGRP |  |
| IS-IS |  | IPX RIP |  |
| NLSP |  | Other ________________ | |
| Unauthenticated NTP traffic |  | SNMP traffic |  |
| SNMP communities found | ___ | SNMP version | ___ |
| NetBIOS over IPX traffic |  | AppleTalk traffic |  |
| DecNet traffic |  | Banyan Vines traffic |  |
| SNA traffic |  | Other ________________ |  |
| Remote administration traffic | | | |
| VNC |  | PCAnywhere |  |
| Webmin |  | Other ________________ |  |
| Remote X Server cookies |  | | | | |
| Syslog traffic |  | over UDP |  |
| | | | | over TCP |  |
| Passive OS fingerprinting | _________________________________ | | | | | | |
| Gateway discovery (IP) | _________________________________ | | | | | | |
| IDS host discovery | _________________________________ | | | | | | |
| ARP spoofing man-in-the-middle attack | _________________________________ | | | | | | |
| Switch CAM table flooding | _________________________________ | | | | | | |
| Route injection attacks | _________________________________ | | | | | | |
| ICMP route redirection | _________________________________ | | | | | | |
| DNS cache poisoning | _________________________________ | | | | | | |
| DHCP DoS attacks | _________________________________ | | | | | |
| Tunneling protocols attack | _________________________________ | | | | | |
| VPN enumeration | _________________________________ | | | | | |
| VPN-related attacks | _________________________________ | | | | | | |
| Active OS fingerprinting | _________________________________ | | | | | | |
| Discovered backdoors / backchannel traffic | _________________________________ | | | | | | |
| Banner grabbing and host penetrationpenetrated hosts () | | | | | | |
| IP/hostname:vulnerability | _________________________________ | | | | | | |
| IP/hostname:vulnerability | _________________________________ | | | | | | |
| IP/hostname:vulnerability | _________________________________ | | | | | | |
| Network / host DoS resilience testing | | | | | | |
| attack/host/result | _________________________________ | | | | | | |
| attack/host/result | _________________________________ | | | | | | |
| attack/host/result | _________________________________ | | | | | | |
| Egress filtering firewall testing from the wireless site | _________________________________ | | | | | | |
| Physical security issues discovered | _________________________________ | | | | | | |
| Social engineering attacks | _________________________________ | | | | | | |