Free YouTube views likes and subscribers? Easily!
Get Free YouTube Subscribers, Views and Likes

Rogue DHCP Server | Man-in-the-Middle Attack

Follow
CertBros

Join the Discord Server!
  / discord  

MY FULL CCNA COURSE
CCNA https://certbros.teachable.com/p/cisc...

FREE CCNA FLASHCARDS
CCNA Flashcards https://certbros.com/ccna/flashcards

HOW TO PASS THE CCNA
Get a great book https://amzn.to/3f16QA5
Take a video course https://certbros.teachable.com/p/cisc...
✔ Use practice exams https://www.certbros.com/ccna/Exsim

SOCIAL
Twitter   / certbros  
Instagram   / certbros  
LinkedIn   / certbros  
Discord https://www.certbros.com/discord

Disclaimer: These are affiliate links. If you purchase using these links, I'll receive a small commission at no extra charge to you.


Before we start, I need to stress that this video is for informational purposes only. If you know how these attacks work, then you can better defend against them. Do not try this on any system that you do not own or have permission to do so.

DHCP, or Dynamic Host Configuration Protocol, is used to assigned IP address information to computers automatically within a network.

By default, the network is very trusting of any computer claiming to be a DHCP server. Attackers can use this trust to perform a malicious maninthemiddle attack called Rough DHCP Server or DHCP Spoofing.

This is done by an attacker claiming to be a DHCP server and replying to DHCP messages. The idea is that the rogue DHCP server will assign IP address information but listing itself as the default gateway. This means all traffic destined for the default gateway can be read by the attacker.

In a corporate network, this attack can be avoided by using a feature called DHCP snooping. DHCP snooping is where a switch will drop frames claiming to be a DHCP server on any interface that isn't manually configured as trusted.

posted by pholeatuptedeb2