Difference between revisions of "DHCP spoof attack"

From Teknologisk videncenter
Jump to: navigation, search
m
m (Show command)
Line 21: Line 21:
 
GigabitEthernet0/1  yes            none
 
GigabitEthernet0/1  yes            none
 
</pre>  
 
</pre>  
See example [[Netband Project - DHCP Snooping]]
+
*See example [[Netband Project - DHCP Snooping]]
See hackipedia [http://www.hakipedia.com/index.php/DHCP_Starvation DHCP_Starvation]
+
*See hackipedia [http://www.hakipedia.com/index.php/DHCP_Starvation DHCP_Starvation]
 
[[Category:Network]][[Category:Security]][[Category:CCNP]][[Category:CCNP3]]
 
[[Category:Network]][[Category:Security]][[Category:CCNP]][[Category:CCNP3]]

Revision as of 09:37, 9 May 2009

A DHCP Spoof attack is a illegal DHCP server setup in a LAN environment which configures the clients with wrong IP information. The illegal DHCP server can configure the clients with it self as the default gateway, in which case all non-local traffic will be sent to the illegal DHCP server where the intruder can inspect or alter the packets before they are sent on to the real gateway. this is known as a man in the middle attack.

Protecting against DHCP spoof attack

On the access switches you can protect against spoofing

ip dhcp spoofing
interface GigabitEthernet0/1
 description Trunk to Distribution layer and DHCP server
 ip dhcp snooping trust

Show command

Switch# show ip dhcp snooping
Switch DHCP snooping is enabled
DHCP Snooping is configured on the following VLANs:
  10 30-40 100 200-220
Insertion of option 82 information is enabled
Interface            Trusted         Rate limit (pps)
---------            -------         ----------------
FastEthernet0/1      no              20
FastEthernet0/2      no              20
GigabitEthernet0/1   yes             none