IncidentResponsev2

4.09.6 Detect and Remove Rogue Network Devices

Task

Detect and remove unauthorized (rogue) network devices that may have been connected to the network to facilitate unauthorized access, sniffing, bridging, or lateral movement.


Conditions

Given access to the network infrastructure (switches, routers), network scanning tools, physical access to network areas, and knowledge of expected network architecture.


Standards


End State

Rogue network devices are detected, validated, and removed or disconnected. Network inventory is updated and reviewed with network owner.


Notes


Manual Steps

Step 1: Obtain Network Inventory and Authorized Device List

Operator Note: This will help you quickly identify unknown MAC and IP addresses later.


Step 2: Scan Network for Active Devices

Tool Platform Usage
Nmap Linux/Windows/macOS Network discovery and port scanning
arp-scan Linux Layer 2 network discovery
Angry IP Scanner Cross-platform Simple IP scanner
Netdisco Linux Network inventory and discovery

Example: Nmap

nmap -sn 192.168.1.0/24

Example: arp-scan (Linux)

sudo arp-scan --interface=eth0 192.168.1.0/24

Results will show:

Operator Note: Devices with unfamiliar vendors (ex: “Shenzhen Co.”) are high priority for review.


Step 3: Analyze Switch CAM Tables for Unknown MAC Addresses

Access managed switches and dump the MAC address table:

show mac address-table

or

show mac-address-table dynamic

Look for:

Operator Note: Multiple MACs on a port often indicates a switch/hub → rogue network expansion risk.


Step 4: Physically Locate Suspect Devices

Methods:

Operator Note: Work with facility or building management if access to secured areas is needed.


Step 5: Validate Device Authorization

Example unauthorized devices:

Device Type Example
Unmanaged Switch $20 switch connected to expand network access
Wi-Fi Router Personal router → risk of DHCP conflicts or open AP
Raspberry Pi / Small PC Potential rogue C2 node
IP Phone with PC passthrough used improperly Risky but not always malicious

Operator Note: Not every rogue device is malicious → accidental misconfigurations should still be removed.


Step 6: Disable or Remove Rogue Devices

Options:

Method Description
Disable switch port Prevent rogue device from communicating
Physically remove device Preferred for unknown or malicious devices
Block MAC address Secondary control if physical removal not immediately possible

Example (Cisco Switch):

configure terminal
interface FastEthernet0/10
shutdown

Operator Note: Always coordinate with network owners → avoid accidental outages.


Step 7: Document and Update Network Inventory


Dependencies


Other Available Tools

Tool Platform Installation Usage
Nmap Cross-platform Package manager Network discovery
arp-scan Linux Package manager Layer 2 scan
Switch CLI Switches Native Show MAC tables
Netdisco Linux Web-based tool Network device inventory

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Created from scratch with deep operator guidance and practical detection/removal procedures Leo