Front | Back |
is a protocol used by networked devices (clients) to obtain the information necessary for operation in an Internet Protocol network.
|
1. Dynamic Host Configuration Protocol (DHCP)-
|
the aim is to associate the attacker's MAC address with the IP address of another node (such as the default gateway)
|
2. Mac address spoofing
|
. an attacker gains access to a DHCP server and modifies the scope, causing incorrect IP address leases and disrupting communication on the netA rogue DHCP server is
|
. Scope modification
|
on a network which is not under the administrative control of the network staff.
|
a DHCP server
|
2. DHCP for remote clients this vulnerability allows remote attackers to execute arbitrary machine code with SYSTEM-level privileges on affected computers.
|
2. DHCP for remote clients
|