How do you feel about this article? Help us to provide better content for you.
Thank you! Your feedback has been received.
There was a problem submitting your feedback, please try again later.
What do you think of this article?
What do you do when you think you may have a rogue IoT device on your network?
In this video, we use an Okdo Rock 4 board to simulate our ‘suspect’ IoT device and another Rock 4 ( 220-9536) to monitor its network traffic. Join me as we use some free, open-source tools to see what’s going on with our network.
Theory and practice
In this first video, I will explain the theory and practice of how we go about monitoring our 'suspect' device
This second video is an EXTRA! Short update, which shows the results of a long monitoring session