A penetration tester is performing a wireless security assessment in an office building. The initial scan for SSIDs does not reveal any unauthorized access points. However, the tester suspects there may be covert wireless devices operating on the premises. Which of the following scanning techniques is most effective for discovering transmitters that are not broadcasting an SSID?
Signal strength scanning, often performed with an RF (Radio Frequency) analyzer or a specialized wireless tool, detects radio transmissions within a frequency band based on their power level. This method can identify any transmitting device, including rogue access points with hidden SSIDs, non-802.11 wireless devices, or covert listening devices, regardless of whether they broadcast an identifiable network name. SSID enumeration specifically looks for broadcasted network names. Bluetooth discovery is limited to finding Bluetooth devices. Port scanning is a network technique used to identify open ports on a host and is not used for discovering raw wireless signals.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is amplitude-based scanning?
Open an interactive chat with Bash
How does amplitude scanning differ from standard network scanning?
Open an interactive chat with Bash
What are some examples of devices detectable through amplitude-based scanning?