IncidentResponsev2

4.09.5 Detect and Remove Rogue Wireless Access Points

Task

Detect and remove unauthorized (rogue) wireless access points (APs) that may have been installed by attackers or unauthorized personnel to facilitate unauthorized network access.


Conditions

Given access to the target environment, wireless network monitoring tools, and physical or remote ability to investigate detected access points.


Standards


End State

All rogue wireless access points are identified, verified, and removed or disabled. Authorized AP inventory is validated and up to date.


Notes


Manual Steps

Step 1: Understand the Authorized Wireless Environment

Before scanning:

Operator Note: This prevents false positives during detection.


Step 2: Scan for Wireless Networks (Passive Detection)

Tool Platform Usage
Kismet Linux Passive wireless scanning
WiFi Explorer macOS GUI wireless scanner
Airodump-ng Linux CLI wireless scanner
NetSpot Windows/macOS Visual wireless survey

Example: Kismet (Linux)

sudo kismet -c wlan0

Kismet will display:

Example: Airodump-ng (Linux)

sudo airodump-ng wlan0

Operator Note: Identify SSIDs or MAC addresses NOT on authorized list → these are potential rogues.


Step 3: Analyze Rogue AP Indicators

Look for:

Indicator Explanation
SSIDs not in authorized list Obvious rogue or misconfigured AP
MAC addresses not registered Spoofed or rogue AP
SSIDs mimicking authorized SSIDs (Evil Twin) Attack attempt to harvest credentials
Unusual channels or power levels Attempt to hide or avoid detection
Hidden SSIDs with clients connected Malicious or stealthy rogue AP

Operator Note: Hidden SSIDs with connected clients → highest priority for investigation.


Step 4: Locate Rogue AP Physically (If Required)

Options:

Operator Note: Coordinate with onsite personnel or physical security.


Step 5: Validate and Investigate Rogue AP

For suspected rogue APs:

sudo tcpdump -i wlan0 -w rogue_ap_capture.pcap

Operator Note: Do NOT send active probes unless approved. Passive capture is preferred.


Step 6: Remove or Disable Rogue AP

Options:

Method Description
Coordinate with network owners → shutdown via managed switch or network ACL Soft removal
Physically disconnect device Hard removal
Use Wireless IDS/WIPS to block (if available) Real-time block

Operator Note: Always document and confirm device removal to prevent return.


Step 7: Update Wireless AP Inventory


Dependencies


Other Available Tools

Tool Platform Installation Usage
Kismet Linux apt/yum Passive detection
Airodump-ng Linux Aircrack-ng suite Passive detection
WiFi Explorer macOS Download Visualization and detection
NetSpot Windows/macOS Download Visualization and detection

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Created from scratch with deep operator-focused detection/removal procedures Leo