#1
(This post was last modified: 27 November, 2020 - 12:09 AM by MeSvAk.)
im gonna fuck u up with  DHCP attacks ! And also some nasty cisco gay stuff u know me homie .  
The DHCP protocol ( google ma friend piece of monkey eyees  [Image: monkayes.gif] [Image: PepoThink.png] [Image: PepoThink.png] [Image: PepoThink.png] )Dynamic Host Configuration Protocol allow computers to automatically receive IP addresses and network configuration from a DHCP server.
Here is a typical IP address obtention for u dummy plsslsllslsl don't suck afterwards:

 
Code:
DHCP Client                   DHCP Server
    +
    +------------------------------>
             DHCP Discover
                                   +
    <------------------------------+
             DHCP Offer
    +
    +------------------------------>
             DHCP Request
                                   +
    <------------------------------+
       DHCP Ack (or Decline, Nack)
    +
    +------------------------------>
             DHCP Release
We can see 7 different kinds of frames if u cant u blind af :
  • DHCP Discover : this frame is broadcasted to all the network, in order to find the DHCP server.
  • DHCP Offer : the server responds to a DHCP discover in unicast. This frame contains network configuration (IP address pool, gateway address…).
  • DHCP Request : the client sends a broadcast frame to announce from which server he want to use the configuration from.
  • DHCP Ack : the chosen DHCP server assigns the IP and configuration parameters and acknowledges.
  • DHCP Nack : the DHCP server rejects the client’s request.
  • DHCP Decline : the client rejects the offered IP address.
  • DHCP Release : the client sends back his assigned IP address beafore the lease expires.
Note that the response from the server (the DHCP Offer frame) contains not only the client IP, but other importants parameters as netmask, default gateway, and DNS.
for further information psllsls suck ur own balls and check google suck cunt . imagers troubles in the bark 
DHCP starvation attackThis first attack consists of exhausting the DHCP server’s IP addresses pool with a huge number of requests. so fucking huge that can be a ddos tho. 
The attacker sends many DHCP requests with differents MAC addresses, which result in using all the available IP addresses. All the new machines that will try to connect to the network will not have any IP.
Then, the attacker can configure his working machine to be the new DHCP server to serve the new machines. 
warning: don't conflict it with some zombie shit u know wot I'm saying bitches.
In a DHCP lease, informations about the default gateway and DNS are transmitted. The attacker can propose a lease to newcomers saying that he is the default gateway, which allow Man In The Middle attacks : every packets sent by hosts will go through the attacker machine.
There is a famous framework for level 2 attacks called 
Code:
yersinia

 that allow us to launch DHCP starvation attacks :
Code:
# yersinia dhcp -attack 1 -interface eth0
After specifying the protocol with the DHCP argument, we indicate the attack mode. 
Code:
-attack 1

 corresponds to ‘DoS attack sending discover packets’. The flag 
Code:
 

-interface

allow us to specify which interface to use during the attack.woho we getting somewhere so fooking hype rat.To stop the attack, just kill the process :

 
Code:
# killall yersinia

DHCP rogue server attackThe goal of this attack is to introduce in the network a rogue DHCP server that will responds to clients requests.
In order to succeed, you have to respond faster to DHCP Discover requests than the initial DHCP server. This can be done by multiple ways :
  • By lauching a DoS attack to the current DHCP server : this will result in a longer time to respond, which give you an advantage.
  • By re-implementing DHCP on the attacker machine : DHCP servers usually do other things (DNS, gateway…). Basically, they take more time to respond than a simple DHCP server. Moreover, they have to look into their cache to see if an IP address has already been attributed, etc… So by implementing a DHCP server that will directly respond to a DHCP Discovery request with a hard-coded IP address, it is possible to be faster.
In reality, you have to be faster twice : to reply to the DHCP Discovery and to send the DHCP Ack to validate the offer.
As seen before, 
Code:
yersinia
 allows us to do this attack :
Code:
# yersinia dhcp -attack 2 -interface eth0
where 
Code:
-attack 2

means ‘nonDoS attack creating DHCP rogue server’. This attack mode does not need to use DoS, as its implementation is probably faster than standard DHCP used in home/office routers.How to protect ( here wat I  promised to ur papas hole shit cisco nasty mom stuff)Being offensive is nice, but it’s interesting to see the blue side of the Force. I’ll talk about Cisco equipment features.
There is 2 principal ways to avoid those attacks on Cisco equipments : DHCP snooping and IP source guard.
  • DHCP snooping allows to filter suspicious DHCP requests, and building what is called a ‘DHCP binding table’. This table contains the DHCP attributions, as MAC addresses, IP addresses, lease duration, VLAN number and corresponding interface.
The sysadmin can specify on the switch trusted interfaces on which DHCP offers and DHCP {Ack,NAck} can be received. Those interfaces are designated as trusted, and others as untrusted.
Each interface that link a client to the switch must be set to untrusted, which only permit DHCP Discover/Request packets to enter; others are dropped.
Ports on which a DHCP server is connected must be set as trusted in order for the switch to accept DHCP Offers and DHCP {Ack,NAck} packets.
The DCHP binding table holds information about untrusted ports, and is fed by dynamic entries learnt via DHCP. On an important network, it is recommended to outsource this table : locally, it is stored in flash memory. For each new entry, its content have to be erased and wrote again. It can also generate heavy CPU loads, and is case of shutdown, all the tables are lost.
It is possible to configure automatic outsourcing as following :

 
Code:
(config)# ip dhcp snooping database ftp://192.168.42.69/binding-table.dhcp
(config)# ip dhcp snooping database write-delay 300
In the example we use FTP, but HTTP, RCP and TFTP are allowed too. 
Code:
write-delay
 is the duration between every copy when the table changes.
  • IP source guard allow us to protect from IP usurpation obtained by DHCP. In this kind of attack, the attacker changes his IP and/or his MAC address in order to access a remote machine (IP spoofing) or to avoid ACL set by the sysadmin.
IP source guard uses the DHCP binding table. At the beginning all the IP traffic is dropped, except DHCP packets. Once a client has received a valid IP from the server, a VLAN ACL is set on the corresponding port. All the traffic emitted with another IP∕MAC on this port will be dropped.
To configure IP source guard on a Cisco swicth, you can enter :
 
Code:
(config)# interface FastEthernet1/0/3 # or whatever interface you want
(config-if)# ip verify source port security


thats all for now but remember ik its frustrating but u needa fuck ur papa and learn it idgaf if  u cant just try to learn dumb cunts and don't forget to always be sad anus and monkey eyes [Image: monkayes.gif] [Image: monkayes.gif] [Image: monkayes.gif] [Image: monkayes.gif] [Image: monkayes.gif] [Image: monkayes.gif] [Image: monkayes.gif] [Image: monkayes.gif] [Image: monkayes.gif] Wooow Wooow Wooow