Hacking Tools dhcp-server

1261 Views | Published on January 5th, 2016

DHCPwn — DHCP IP exhaustion attack

DHCPwn is a tool used for testing DHCP IP exhaustion attacks. It can also be used to sniff local DHCP traffic.

 

The DHCP protocol is connectionless and implemented via UDP. These two characteristics allow this attack to be performed. Since there is no actual connection being made between the client and server we can quickly send many spoofed requests.

DHCP servers rely on the senders MAC address to allocate IP addresses. We can easily spoof many requests with different, fake MAC addresses. This will eventually exhaust the server’s ability to assign new IP addresses. Depending on the server’s method of releasing IP addresses associated with a given MAC address this attack will either be more, or less effective. For example, if a server quickly releases allocations that it doesn’t receive responses from, the attack will be less effective.

▼Advertisements

This attack is typically considered to be a form of DoS.

 

Installing

$ pip install git+https://github.com/mschwager/dhcpwn

OR

$ git clone https://github.com/mschwager/dhcpwn.git
$ pip install -r requirements.txt

 

Using

Flood:

$ dhcpwn --interface wlan0 flood --count 256

Sniff:

$ dhcpwn --interface wlan0 sniff

Help:

$ dhcpwn -h

▼Advertisements

Source && Download

Share on Facebook0Share on Google+0Tweet about this on TwitterShare on Reddit0Email this to someonePrint this pageShare on StumbleUpon0Digg thisPin on Pinterest0Share on LinkedIn0




Leave a Reply

Your email address will not be published. Required fields are marked *

Back to Top ↑

You Might Also Like:
Apple Patches Dozens of Flaws in iOS 8.4, OS X 10.10.4

Apple has released new versions of iOS and OS X, both of which include a significant number of security patches,...

Close