The Setup: A Normal Tuesday
It's 09:15. A patient walks in for a routine scale-and-polish. They sit in your waiting room, pull out their phone, and ask your receptionist for the WiFi password. Your receptionist recites it without a second thought — it's been the same password for three years, printed on every appointment card.
That patient connects. Their phone handshakes with your AP, gets an IP from your DHCP server, and is now a fully routed node on the same broadcast domain as every other device in your building. Including your Carestream CS3600 intraoral scanner. Your Dentrix workstation. Your billing server. Your NAS.
I run a dental practice and I run penetration tests. I have sat in my own waiting room with a laptop and mapped my entire clinical network in under four minutes before I hardened it. This article is about what I found — and what an actual attacker would do with it. The tools I used are free. They require no special skills. Anyone can do this.
Why Practices Are Especially Vulnerable
Dental and medical practices sit in a uniquely dangerous position. They hold protected health information (PHI) — some of the most valuable data on the criminal market, worth up to 40× more than a payment card number — yet most run with the security posture of a home network. Clinical imaging systems, patient management software, and billing portals often run on Windows 10 workstations that haven't been patched since the software vendor last visited. SMB shares are open. RDP is enabled. Default credentials are still in place on network printers and IP cameras.
And crucially — in South Africa, POPIA (Protection of Personal Information Act) places legal obligations on you as the Responsible Party for that data. A network breach that exposes patient records is not merely an IT problem. It is a regulatory event with mandatory reporting obligations to the Information Regulator and potentially significant financial penalties.
Step One: Passive Recon Before You Even Connect
An attacker doesn't even need your WiFi password to start learning about you. From the car park — or any location within radio range — they can run passive wireless reconnaissance without transmitting a single packet.
Tools like Kismet and Wireshark in promiscuous mode go further. Unencrypted or weakly encrypted traffic — multicast DNS (mDNS), NetBIOS name broadcasts, UPnP announcements — leaks device names, operating systems, software versions, and sometimes hostnames that directly identify clinical systems, all before a single authentication has taken place.
Every device that has ever connected to a named WiFi network will periodically broadcast that SSID in a probe request, asking if it's nearby. A patient in your waiting room may be leaking the SSIDs of their home network, their employer's network, and every coffee shop they've visited. An attacker with a rogue access point can respond to those probes and capture credentials. This is a side threat — but it illustrates how much information flows through WiFi without anyone noticing.
Step Two: Active Network Enumeration
Once connected — with the password from your reception desk, or from the WiFi card on your waiting room table — the attacker begins active enumeration. This is where the damage compounds rapidly. Every device on an unsegmented network is discoverable, and most clinical environments have devices that were never designed to face a hostile network.
Host Discovery: Finding Every Device
That output above is not hypothetical. It is a representative composite of what I have found during practice assessments. Windows 7 running clinical imaging software is not unusual — Carestream, Planmeca, and other vendors have historically locked practices to specific OS versions for driver compatibility, and upgrade cycles lag years behind patch schedules. Windows 7 reached end-of-life in January 2020. It no longer receives security updates. Any known vulnerability from the last six years is permanently unpatched and permanently exploitable.
Service Enumeration: What's Running and How Old Is It?
SMBv1 is the protocol exploited by EternalBlue, the NSA-developed exploit leaked by Shadow Brokers in 2017 and weaponised in WannaCry and NotPetya. Both of those ransomware campaigns specifically devastated healthcare providers worldwide. SMBv1 is disabled by default in Windows 10 — but it is frequently re-enabled by clinical software installers and IT contractors who find it "easier" to leave it on for legacy compatibility. Check yours. Right now.
ARP Poisoning & Traffic Interception
On a flat network, an attacker can perform ARP cache poisoning — sending forged ARP responses to make the router think the attacker's machine is a legitimate host, and vice versa. This positions the attacker in a man-in-the-middle (MitM) position, allowing them to intercept, read, and modify all traffic between selected devices and the gateway — including unencrypted HTTP sessions to practice management portals, internal web admin pages for printers and NAS devices, and any clinical software that communicates over plain TCP.
Nessus: The Same View Whether You're Inside or Outside
This is the part that surprises most practice owners when I demonstrate it. Nessus Essentials — the free tier of one of the world's most widely used vulnerability scanners — is available to anyone. And when it comes to what it can see on your network, there is functionally no difference between someone connecting via your waiting room WiFi and someone running a scan from inside your building on a physical cable.
Once an attacker has a routed IP address on your network — whether via WiFi or Ethernet — Nessus sees the same hosts, the same open ports, the same running services, and returns the same vulnerability findings. The physical medium is irrelevant. Network access is network access.
SMBv1 enabled on Windows 7/10 workstation. Remote code execution without authentication. An attacker on the same network segment can gain SYSTEM-level shell on this machine in under 90 seconds using publicly available Metasploit modules. This single finding means complete compromise of the affected workstation is trivial.
Multiple devices responding to default manufacturer credentials (admin/admin, admin/password, root/root). TP-Link router, Hikvision camera, and HP printer all fully accessible with vendor defaults. Camera provides live and recorded footage of the clinical area. Router admin access allows DNS manipulation, traffic redirection, and persistent backdoor installation via firmware modification.
SMB file shares accessible without authentication contain patient images (DICOM files), practice management backups, and financial records. An attacker can exfiltrate the entire contents of these shares silently. Patient images alone constitute protected health information under POPIA. This is a notifiable breach on its own.
Internal web services (NAS admin, printer, IP camera) using TLS 1.0 or unencrypted HTTP. Self-signed certificates with no chain of trust. Users have been trained to click through certificate warnings. Any traffic to these internal services is susceptible to interception.
Tenable offers Nessus Essentials at no cost — unlimited scans against up to 16 IP addresses. A typical small practice has fewer than 16 devices. This means a complete professional-grade vulnerability assessment of your entire network is available to anyone who can reach your network. Your IT contractor should be running this against your practice quarterly. If they haven't mentioned Nessus, ask them why.
Lateral Movement: From Patient Phone to Patient Records
This is the attack chain that matters most. An attacker doesn't need to immediately target your most sensitive system. They can start anywhere — even from a patient's compromised phone — and work their way across the network. Each compromised device becomes a launching pad for the next attack.
Patient connects to practice WiFi. Receives 192.168.1.x IP via DHCP. Is now a fully routed member of the internal network. No firewall rules exist between WiFi clients and clinical devices because everything is on the same flat subnet.
nmap -sV reveals all hosts. NetBIOS/mDNS passively identifies device names. SMB enumeration finds open shares. Printer web interface accessible on port 80 without credentials. Nessus scan returns full vulnerability list within minutes.
Router accessed with default credentials. DNS settings modified to redirect traffic. Or: SMBv1 exploited on the X-ray workstation via EternalBlue. Metasploit delivers a Meterpreter shell in under 2 minutes. The attacker now has a persistent local presence.
From the compromised workstation, credentials are harvested from memory using Mimikatz. Those same credentials are reused across other hosts (credential stuffing internally). Pass-the-hash attacks allow authentication to the Dentrix server and NAS without ever cracking a password.
Patient records, clinical images, financial data, and staff credentials exfiltrated silently. Or: ransomware deployed across all reachable hosts simultaneously. The entire practice encrypted. Clinical operations halted. The ransom note appears on every screen.
Mimikatz is a credential extraction tool that reads plaintext passwords and NTLM hashes from Windows memory (lsass.exe). It requires local admin or SYSTEM access — which EternalBlue delivers. Once you have credentials from one machine, you attempt them everywhere. Most small practices reuse the same local admin password across all workstations. One successful EternalBlue exploit on the X-ray machine can cascade into full control of every Windows host in the building within minutes.
The Car Park Threat: You Don't Need to Come Inside
Here is the thing that most practice owners fail to internalise: physical presence in your building is not required for any of the above.
Modern 802.11n/ac/ax access points have a typical indoor range of 30–50 metres. In open air — like a car park — signal propagates further. A standard laptop WiFi card can comfortably associate with most practice APs from a car parked outside. A Alfa AWUS036ACH USB adapter with a directional antenna extends effective range to 200–300 metres. An attacker sitting in their car, in your car park, on their laptop, is network-equivalent to a patient sitting in your waiting room.
WPA2 Is Not As Safe As You Think
WPA2-Personal (the PSK mode virtually every practice uses) has a well-documented offline cracking attack. When any device connects to your network, a 4-way EAPOL handshake is transmitted over the air. An attacker can passively capture this handshake — or force a re-authentication by sending a single deauth frame — and then take the handshake offline for dictionary and brute-force attacks. Tools like hashcat running on a mid-range GPU can test billions of password combinations per second. A weak password ("Practice@2021", "Dental123", the street address) falls quickly.
The PMKID attack, published in 2018, is even more convenient — it doesn't even require capturing a client handshake. An attacker can derive the cracking hash directly from the router's beacon frames. No client needs to connect. No one needs to be in the building.
A WiFi password is only as strong as its entropy. "DrSmith2024!" can be cracked in hours with rockyou-based wordlists and rule mutations. A true random 20-character password (e.g., xK9#mQ2vBp$nL4wJtY7r) is computationally infeasible to crack. The difference in user experience is one extra second of typing. The difference in security is everything.
Hardening Your Network: What You Must Do
The good news: the gap between a fatally vulnerable practice network and a defensible one is not enormous. You do not need enterprise-grade hardware or a full-time security team. You need the right architecture and a handful of non-negotiable configuration changes.
The Non-Negotiable Hardening Checklist
The Bottom Line
Sharing your WiFi password with patients is not a small kindness — it is an access grant to a node on your clinical network. Every unpatched system, every default credential, every open SMB share that exists on that network is now reachable by anyone who has ever sat in your waiting room. And they don't need to be in your waiting room at all. They just need to be close enough to connect.
The attacker in this scenario doesn't need to be sophisticated. They need nmap, Nessus Essentials, and the password from your reception desk. The entire attack chain described in this article uses free, publicly available tools that appear in every penetration testing course on the internet. The tools are not the problem. The flat, unsegmented network is the problem.
VLAN segmentation, strong passwords, WPA3, disabled SMBv1, changed default credentials, and quarterly Nessus scans. Those eight things, implemented properly, close the majority of the attack surface described above. They cost almost nothing compared to the cost of a breach, a ransomware payment, an Information Regulator investigation, or the reputational damage of telling your patients their medical records were compromised because you shared the WiFi password.
I assess dental and medical practices across South Africa from both the guest WiFi and the clinical network perspective. I know your software. I know what Nessus finds. I know where the bodies are buried. If you want to know what an attacker sees when they sit in your waiting room — before an attacker sits in your waiting room — get in touch.