Wireless Attack Analysis

Description

At least 250 words.

How would you approach identifying and locating a rogue wireless access point at a work-site? For the locating, assume you do not have access to any enterprise monitoring software, how could you physically locate a rogue access point? See section 6.5 of your textbook for some ideas, but please use your own words and use sufficient detail. If you would use a certain technique, is there software or hardware that would support you? You may need to do some outside research. What evidence could you gather from the access point? You do not have to address all these points, but please use them to guide your discussion.

This question has been answered.

Get Answer