Rogue DHCP Server | Man-in-the-Middle Attack

  Рет қаралды 46,264

CertBros

CertBros

Күн бұрын

Join the Discord Server!
/ discord
---------------------
MY FULL CCNA COURSE
📹 CCNA - certbros.teach...
FREE CCNA FLASHCARDS
🃏 CCNA Flashcards - certbros.com/c...
HOW TO PASS THE CCNA
📚 Get a great book - amzn.to/3f16QA5
📹 Take a video course - certbros.teach...
✔ Use practice exams - www.certbros.c...
SOCIAL
🐦 Twitter - / certbros
📸 Instagram - / certbros
👔 LinkedIn - / certbros
💬 Discord - www.certbros.c...
Disclaimer: These are affiliate links. If you purchase using these links, I'll receive a small commission at no extra charge to you.
---------------------------------------------------------------------------------------------------------------
Before we start, I need to stress that this video is for informational purposes only. If you know how these attacks work, then you can better defend against them. Do not try this on any system that you do not own or have permission to do so.
DHCP, or Dynamic Host Configuration Protocol, is used to assigned IP address information to computers automatically within a network.
By default, the network is very trusting of any computer claiming to be a DHCP server. Attackers can use this trust to perform a malicious man-in-the-middle attack called Rough DHCP Server or DHCP Spoofing.
This is done by an attacker claiming to be a DHCP server and replying to DHCP messages. The idea is that the rogue DHCP server will assign IP address information but listing itself as the default gateway. This means all traffic destined for the default gateway can be read by the attacker.
In a corporate network, this attack can be avoided by using a feature called DHCP snooping. DHCP snooping is where a switch will drop frames claiming to be a DHCP server on any interface that isn't manually configured as trusted.

Пікірлер: 85
@MrAwesomenesh
@MrAwesomenesh 3 жыл бұрын
You guys rock! This channel has seriously helped my fundamental knowledge as I prepare for higher certs. I love the perspective you guys attack each subject with.
@Certbros
@Certbros 3 жыл бұрын
Wow thanks! Really appreciate it!
@ishmaelvaughn9110
@ishmaelvaughn9110 3 жыл бұрын
I come to you guys any time I do not understand a networking concept, and every time you guys make it easier and visible for me to understand. Content goes crazy thank you!
@Certbros
@Certbros 3 жыл бұрын
Thank you Ishmael! Really great to hear the videos are helping. Hope to have more for you very soon!
@electroplank587
@electroplank587 3 жыл бұрын
the style and flow of your videos are great. Looking forward to seeing more like these and CCNA material is really helping.
@Certbros
@Certbros 3 жыл бұрын
Great to hear! Lots more to come.
@MrArnipress
@MrArnipress 2 жыл бұрын
It saddens me that such an amazing content has such a little views. Deserves way more than that.
@Gajendra463
@Gajendra463 Жыл бұрын
I literally took CEH v11 Course but this small video gave me so much knowledge that I actually got from that class.
@goobyssi
@goobyssi 2 жыл бұрын
awesome video! thank you for showing how it actually works! I studied Network+ but never knew how it worked and always wondered.
@LoneWolf137
@LoneWolf137 3 жыл бұрын
Thanks for your hard work! Awesome video!!!
@Certbros
@Certbros 3 жыл бұрын
Thanks! Happy to hear you liked it. These comments make the work worth it 👌
@sadeeshkumar654
@sadeeshkumar654 3 жыл бұрын
Brilliant content. Thank you
@Certbros
@Certbros 3 жыл бұрын
Thank you Sadeesh!
@neealdon2-g6j
@neealdon2-g6j Жыл бұрын
Its so sad that so many people are missing out on these awsome videos😥
@Alexei_Nikolaev
@Alexei_Nikolaev 3 жыл бұрын
Nice lesson, thanks! The only little thing is missed. The kali Linux settings that forward hacked user's traffic back to router.
@di0r
@di0r 9 ай бұрын
Actually very good video. Subbed
@MA-nc8uc
@MA-nc8uc 2 жыл бұрын
Thank you..Wonderfully done! Much appreciated
@grandfatherm5774
@grandfatherm5774 2 жыл бұрын
Real goat video
@martinacapparelli2359
@martinacapparelli2359 3 жыл бұрын
Sorry, I don't understand what you do at 7:40. How can I open a Cisco router? Can you help me? I really don't know how to do
@mrgigs08
@mrgigs08 2 жыл бұрын
Like I said, you guys are amazing! F**** Bombal that guy is drilling my brains just in vain. That is what I call explanation I mean yours of course! great job guys!
@leothalion3983
@leothalion3983 3 жыл бұрын
This was awesome!!!!!!!
@Certbros
@Certbros 3 жыл бұрын
Thank you Joseph!
@WeBBerTutoriais
@WeBBerTutoriais 3 жыл бұрын
Very Good!! Brazil!
@Certbros
@Certbros 3 жыл бұрын
Thank you! I would love to visit Brazil one day!
@jessil77
@jessil77 3 жыл бұрын
Loved it xo
@Certbros
@Certbros 3 жыл бұрын
Thank you Jessil!
@harkaman4205
@harkaman4205 2 жыл бұрын
Sup man, keep going. Ur vids are very interesting
@angelnavedo8086
@angelnavedo8086 2 жыл бұрын
Thank You !
@mackynikat8833
@mackynikat8833 3 жыл бұрын
. this is nothing but great video though , keep uploading videos like these so that you will not only help to educate but i will also help to spread out the word to prevent cyber hacking
@mani_logs
@mani_logs 6 ай бұрын
Very nice for learning❤but i think i'ts better to say: IF WEBSITE HAVE (HTTPS) AND SSL OR TSL VERIFICATION, WE CAN'T USE MITM ATTACK. Thanks
@BugsVsHumans
@BugsVsHumans Жыл бұрын
Hi how can you stop rogue dhcp server from a network? How do you configure the router to stop it?
@zakariasabbagh
@zakariasabbagh 2 жыл бұрын
Great video!!
@abhik67590
@abhik67590 3 жыл бұрын
Great video, already waiting for the next video.
@Certbros
@Certbros 3 жыл бұрын
Thank you Abhishek!
@SzwarcuKX5
@SzwarcuKX5 3 жыл бұрын
Lovely content
@Certbros
@Certbros 3 жыл бұрын
Thank you!
@sadisalgama9956
@sadisalgama9956 3 жыл бұрын
Good video clip perfectly explained..!!!
@Best_Blockchan_Builders
@Best_Blockchan_Builders 3 жыл бұрын
What is the difference between app poisoning and this?
@Certbros
@Certbros 3 жыл бұрын
I assume you mean ARP Poisoning. The outcome is very similar but the way we achieve it is different. Rogue DHCP / DHCP spoofing requires the attacker to assign malicious IP address information by taking the role of a DHCP server. ARP poisoning requires the attacker to send false information to the network and pretend to be someone he is not.
@Best_Blockchan_Builders
@Best_Blockchan_Builders 3 жыл бұрын
@@Certbros Thank you for the explanation
@Certbros
@Certbros 3 жыл бұрын
No problem Alexander! Happy to help 👍
@erwindee7384
@erwindee7384 3 жыл бұрын
I know HTTPS protects against this very effectively, but is there any way to make sure that I'm connecting to the right DHCP server when, say, I connect to public Wi-Fi? Let's say I didn't connect to some hacker's Wi-Fi network and I really am on some legitimate coffee shop's Wi-Fi network. How do I make sure I'm getting DHCP from the coffee shop's router?
@laplongejunior
@laplongejunior 3 жыл бұрын
I think you can't as DHCP is broadcast based and there's no reason to assume the DHCP would be on the router. In my own lan, the router's DHCP is for static configuration only and unknown clients are issued IPs by my Pihole
@jaydenritchie1992
@jaydenritchie1992 Жыл бұрын
so wifi connection or lan vpn or pppoe logon would eliminate this?
@abdodana2637
@abdodana2637 2 жыл бұрын
you are correct about https but what if attacker do SSL strip bro ?!!
@BiMathAx
@BiMathAx 3 жыл бұрын
You need more than 300 likes...
@Certbros
@Certbros 3 жыл бұрын
Thanks! I'll give you a like for the comment 😀
@abhik67590
@abhik67590 3 жыл бұрын
So is it possible that i connect to unknown/free wifi in a cafe , so now it is my default gateway? If yes then if i login to http site then the free wifi guy can see my credential using wireshark?
@M3nt4LC4t
@M3nt4LC4t 3 жыл бұрын
I think they cannot, even though they can see your traffic accessing Facebook. Because Facebook is using https, our credentials are encrypted.
@abhik67590
@abhik67590 3 жыл бұрын
@@M3nt4LC4t if site is http then is it possible?
@M3nt4LC4t
@M3nt4LC4t 3 жыл бұрын
@@abhik67590 yes it is possible. because http traffic are not encrypted. you can see example as in the video.
@helamanavalos9806
@helamanavalos9806 3 жыл бұрын
Ussually you would see two wifi networks , like amm, Starbucks and Starbucks_official, being the first one the real wifi and the second one the wifi that the attacker created so people connects to that and spy traffic with wireshark.
@abhik67590
@abhik67590 3 жыл бұрын
@@helamanavalos9806 ✌Thanks
@TheGodOfAllThatWas
@TheGodOfAllThatWas 2 жыл бұрын
A rogue DHCP server doesn't even have to be a MITM attack to be a headache..... Things like wireless AP's and some NAS devices can be misconfigured to run DHCP to an internet connection they don't have and cause all kinds of weird headaches. It's especially annoying if the Flash memory it uses for booting is starting to go out and it resets itself to default on occasion, when the default is DHCP to be on, and it's not connected in a manor to handle WAN traffic. Suddenly people get Duplicate IP messages, or can access the LAN but not the internet, or some people can't access anything but others are fine..... And then it goes away when you show up to fix it.... To only come back in a day or two..... The duplicate IP thing is kind of a dead give away, but beyond that it can be a big headache to troubleshoot since like mentioned in the video it's pretty random when your computer will decide it'll take a new IP address.
@vladislavkaras491
@vladislavkaras491 3 жыл бұрын
Great video! Thanks for practical demonstration of how it looks and how it works! I do have a question. When I connect to http (and maybe even https) through the hacker's PC, do I leave such things as cookies, and similiar stuff, that can be used instead of login credintials? Thanks for the video!
@TheGodOfAllThatWas
@TheGodOfAllThatWas 2 жыл бұрын
Webserver tells your computer to set a cookie.... Your computer can then potentially send the data in the cookie instead of the using a user name and password. On a non-encrypted connection the hackers PC would see that information (either the instruction from the server to set the cookie, or your computer saying Hey use this cookie) and be able to record the cookies used. I assume there's a tool a hacker could use, but worse case Wireshark would show the raw data. So you wouldn't "Leave" the cookies, but you'd allow the hacker to scan the cookie and recreate it. Like mentioned in the video encryption (Https, or a vpn) would stop this.
@vladislavkaras491
@vladislavkaras491 2 жыл бұрын
@@TheGodOfAllThatWas Thanks for the detailed answer!
@ganeshmurugan157
@ganeshmurugan157 3 жыл бұрын
Awesome video sir.can u uploaded video on icmp redirecting in mitm sir?
@Certbros
@Certbros 3 жыл бұрын
Thanks for the suggestion. I've added it to the suggestion list. If I get more requests I will definitely look at making this.
@alurma
@alurma 3 жыл бұрын
Thanks
@Certbros
@Certbros 3 жыл бұрын
You're welcome Vasya!
@M3nt4LC4t
@M3nt4LC4t 3 жыл бұрын
off topic. what about phishing websites that are using https? how the scammer obtain users' credential?
@Certbros
@Certbros 3 жыл бұрын
Great question! It's now common for phishing sites to use HTTPS. Because the bad guys own the websites, they are able to see what credentials are being inputed by the victim.
@espionn
@espionn 3 жыл бұрын
You missed the word 'snooping' in the description :)
@Certbros
@Certbros 3 жыл бұрын
Great spot! Thank you 😁
@8080VB
@8080VB 3 жыл бұрын
K , could you show the same in yersinia ? deploy this rogue attack on yersinia plz
@Certbros
@Certbros 3 жыл бұрын
Thanks for the suggestion! I'll definitely look to make some Yersinia videos in the future.
@8080VB
@8080VB 3 жыл бұрын
@@Certbros cool i'll wait
@charlenelouise4758
@charlenelouise4758 3 жыл бұрын
i just hate configuring dhcp snooping in packet tracer, it doesn't work and it could be a lil buggy
@sijorilsenglarians7907
@sijorilsenglarians7907 2 жыл бұрын
😍😍😍
@saifalmarwani
@saifalmarwani 2 жыл бұрын
many thanks Mate : _
@silvanabongiorno3292
@silvanabongiorno3292 3 ай бұрын
👌🥀🖥💻thanks, useful
@undeadhero9141
@undeadhero9141 3 жыл бұрын
so how do i stop this please??
@xxxtentacionforever3037
@xxxtentacionforever3037 3 жыл бұрын
very nice
@Certbros
@Certbros 3 жыл бұрын
Thanks
@hellou3874
@hellou3874 2 жыл бұрын
thank
@pankajholariya8331
@pankajholariya8331 2 жыл бұрын
nice
@pati6239
@pati6239 3 жыл бұрын
Please make a video about APIs
@Certbros
@Certbros 3 жыл бұрын
Working on it!
@kevorka3281
@kevorka3281 Жыл бұрын
What's a rooter
@Certbros
@Certbros Жыл бұрын
🤷‍♂️
@wildyato37
@wildyato37 3 жыл бұрын
Now don't trust router....and get fcking Cellular connection..
@techstuff42
@techstuff42 2 жыл бұрын
A tip... I went to increase the speed of the video only to realize it was at 2.0x already. So the tip, don't talk so very slow
@alfonzo7822
@alfonzo7822 2 жыл бұрын
Is it possible that planting malware on a device could then force all traffic to http so it can be intercepted? I'm dealing with a network attack and I've come to the conclusion that mitm is what I'm dealing with. Unfortunately the devices contain some kind of code that reconnects to some kind of server out there when I've rebooted the router. I think everything will need a clean install once I've figured out how to fix the mess I'm in . Got a new router but due to devices not being clean it's started all over again. Antivirus has found and cleaned heuristic Trojans but I can't figure out how to fix the TV 🫤
ARP Poisoning | Man-in-the-Middle Attack
11:35
CertBros
Рет қаралды 294 М.
Finding And Stopping Rogue DHCP Servers On MikroTik
12:00
The Network Berg
Рет қаралды 27 М.
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
DNS Explained | Domain Name System | Cisco CCNA 200-301
11:59
CertBros
Рет қаралды 200 М.
Network Basics - What is a network? // FREE CCNA 200-301 course
18:44
David Bombal Tech
Рет қаралды 79 М.
How HACKERS Send Malware | DNS Spoofing
11:46
Cyb3rMaddy
Рет қаралды 63 М.
Configuring DHCP using Cisco iOS - DHCP Server & DHCP Helper
18:57
LearnTech Training
Рет қаралды 269 М.
Port Forwarding Explained + The Risks You Need to Know
14:03
CertBros
Рет қаралды 40 М.
DHCP Explained - Dynamic Host Configuration Protocol
10:10
PowerCert Animated Videos
Рет қаралды 3 МЛН
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,6 МЛН
THE UNTOLD STORY: How the PIX Firewall and NAT Saved the Internet
21:50
The Serial Port
Рет қаралды 431 М.