Рет қаралды 46,264
Join the Discord Server!
/ discord
---------------------
MY FULL CCNA COURSE
📹 CCNA - certbros.teach...
FREE CCNA FLASHCARDS
🃏 CCNA Flashcards - certbros.com/c...
HOW TO PASS THE CCNA
📚 Get a great book - amzn.to/3f16QA5
📹 Take a video course - certbros.teach...
✔ Use practice exams - www.certbros.c...
SOCIAL
🐦 Twitter - / certbros
📸 Instagram - / certbros
👔 LinkedIn - / certbros
💬 Discord - www.certbros.c...
Disclaimer: These are affiliate links. If you purchase using these links, I'll receive a small commission at no extra charge to you.
---------------------------------------------------------------------------------------------------------------
Before we start, I need to stress that this video is for informational purposes only. If you know how these attacks work, then you can better defend against them. Do not try this on any system that you do not own or have permission to do so.
DHCP, or Dynamic Host Configuration Protocol, is used to assigned IP address information to computers automatically within a network.
By default, the network is very trusting of any computer claiming to be a DHCP server. Attackers can use this trust to perform a malicious man-in-the-middle attack called Rough DHCP Server or DHCP Spoofing.
This is done by an attacker claiming to be a DHCP server and replying to DHCP messages. The idea is that the rogue DHCP server will assign IP address information but listing itself as the default gateway. This means all traffic destined for the default gateway can be read by the attacker.
In a corporate network, this attack can be avoided by using a feature called DHCP snooping. DHCP snooping is where a switch will drop frames claiming to be a DHCP server on any interface that isn't manually configured as trusted.