Detect and remove unauthorized (rogue) network devices that may have been connected to the network to facilitate unauthorized access, sniffing, bridging, or lateral movement.
Given access to the network infrastructure (switches, routers), network scanning tools, physical access to network areas, and knowledge of expected network architecture.
Rogue network devices are detected, validated, and removed or disconnected. Network inventory is updated and reviewed with network owner.
Operator Note: This will help you quickly identify unknown MAC and IP addresses later.
Tool | Platform | Usage |
---|---|---|
Nmap | Linux/Windows/macOS | Network discovery and port scanning |
arp-scan | Linux | Layer 2 network discovery |
Angry IP Scanner | Cross-platform | Simple IP scanner |
Netdisco | Linux | Network inventory and discovery |
nmap -sn 192.168.1.0/24
sudo arp-scan --interface=eth0 192.168.1.0/24
Results will show:
Operator Note: Devices with unfamiliar vendors (ex: “Shenzhen Co.”) are high priority for review.
Access managed switches and dump the MAC address table:
show mac address-table
or
show mac-address-table dynamic
Look for:
Operator Note: Multiple MACs on a port often indicates a switch/hub → rogue network expansion risk.
Operator Note: Work with facility or building management if access to secured areas is needed.
Example unauthorized devices:
Device Type | Example |
---|---|
Unmanaged Switch | $20 switch connected to expand network access |
Wi-Fi Router | Personal router → risk of DHCP conflicts or open AP |
Raspberry Pi / Small PC | Potential rogue C2 node |
IP Phone with PC passthrough used improperly | Risky but not always malicious |
Operator Note: Not every rogue device is malicious → accidental misconfigurations should still be removed.
Options:
Method | Description |
---|---|
Disable switch port | Prevent rogue device from communicating |
Physically remove device | Preferred for unknown or malicious devices |
Block MAC address | Secondary control if physical removal not immediately possible |
Example (Cisco Switch):
configure terminal
interface FastEthernet0/10
shutdown
Operator Note: Always coordinate with network owners → avoid accidental outages.
Tool | Platform | Installation | Usage |
---|---|---|---|
Nmap | Cross-platform | Package manager | Network discovery |
arp-scan | Linux | Package manager | Layer 2 scan |
Switch CLI | Switches | Native | Show MAC tables |
Netdisco | Linux | Web-based tool | Network device inventory |
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Created from scratch with deep operator guidance and practical detection/removal procedures | Leo |