How would you respond to a malicious device on your network?
Today I found a device I didn't recognize on my network. Turned out it was ok, but now I'd like to know what you would do.
Specifically what would you do if it was malicious.
I used nmap and did some intensive scanning. I tried connecting to it via open ports.
I guess I would have ultimately banned the mac and changed some passwords, but I wasn't too panicked.
Can I use wireshark to monitor the traffic to the box?
Last edited by wlraider70; June 13th, 2013 at 09:33 PM.
I don' really like coffee. I guess I'll give my Ubuntu beans to my wife.
Luke
Bookmarks