OP 27 November, 2020 - 12:07 AM
(This post was last modified: 27 November, 2020 - 12:09 AM by MeSvAk.)
im gonna fuck u up with DHCP attacks ! And also some nasty cisco gay stuff u know me homie .
The DHCP protocol ( google ma friend piece of monkey eyees )Dynamic Host Configuration Protocol allow computers to automatically receive IP addresses and network configuration from a DHCP server.
Here is a typical IP address obtention for u dummy plsslsllslsl don't suck afterwards:
We can see 7 different kinds of frames if u cant u blind af :
for further information psllsls suck ur own balls and check google suck cunt . imagers troubles in the bark
DHCP starvation attackThis first attack consists of exhausting the DHCP server’s IP addresses pool with a huge number of requests. so fucking huge that can be a ddos tho.
The attacker sends many DHCP requests with differents MAC addresses, which result in using all the available IP addresses. All the new machines that will try to connect to the network will not have any IP.
Then, the attacker can configure his working machine to be the new DHCP server to serve the new machines.
warning: don't conflict it with some zombie shit u know wot I'm saying bitches.
In a DHCP lease, informations about the default gateway and DNS are transmitted. The attacker can propose a lease to newcomers saying that he is the default gateway, which allow Man In The Middle attacks : every packets sent by hosts will go through the attacker machine.
There is a famous framework for level 2 attacks called
that allow us to launch DHCP starvation attacks :
After specifying the protocol with the DHCP argument, we indicate the attack mode.
corresponds to ‘DoS attack sending discover packets’. The flag
allow us to specify which interface to use during the attack.woho we getting somewhere so fooking hype rat.To stop the attack, just kill the process :
DHCP rogue server attackThe goal of this attack is to introduce in the network a rogue DHCP server that will responds to clients requests.
In order to succeed, you have to respond faster to DHCP Discover requests than the initial DHCP server. This can be done by multiple ways :
As seen before,
allows us to do this attack :
where
means ‘nonDoS attack creating DHCP rogue server’. This attack mode does not need to use DoS, as its implementation is probably faster than standard DHCP used in home/office routers.How to protect ( here wat I promised to ur papas hole shit cisco nasty mom stuff)Being offensive is nice, but it’s interesting to see the blue side of the Force. I’ll talk about Cisco equipment features.
There is 2 principal ways to avoid those attacks on Cisco equipments : DHCP snooping and IP source guard.
Each interface that link a client to the switch must be set to untrusted, which only permit DHCP Discover/Request packets to enter; others are dropped.
Ports on which a DHCP server is connected must be set as trusted in order for the switch to accept DHCP Offers and DHCP {Ack,NAck} packets.
The DCHP binding table holds information about untrusted ports, and is fed by dynamic entries learnt via DHCP. On an important network, it is recommended to outsource this table : locally, it is stored in flash memory. For each new entry, its content have to be erased and wrote again. It can also generate heavy CPU loads, and is case of shutdown, all the tables are lost.
It is possible to configure automatic outsourcing as following :
In the example we use FTP, but HTTP, RCP and TFTP are allowed too.
is the duration between every copy when the table changes.
To configure IP source guard on a Cisco swicth, you can enter :
thats all for now but remember ik its frustrating but u needa fuck ur papa and learn it idgaf if u cant just try to learn dumb cunts and don't forget to always be sad anus and monkey eyes
The DHCP protocol ( google ma friend piece of monkey eyees )Dynamic Host Configuration Protocol allow computers to automatically receive IP addresses and network configuration from a DHCP server.
Here is a typical IP address obtention for u dummy plsslsllslsl don't suck afterwards:
Code:
DHCP Client DHCP Server
+
+------------------------------>
DHCP Discover
+
<------------------------------+
DHCP Offer
+
+------------------------------>
DHCP Request
+
<------------------------------+
DHCP Ack (or Decline, Nack)
+
+------------------------------>
DHCP Release
- DHCP Discover : this frame is broadcasted to all the network, in order to find the DHCP server.
- DHCP Offer : the server responds to a DHCP discover in unicast. This frame contains network configuration (IP address pool, gateway address…).
- DHCP Request : the client sends a broadcast frame to announce from which server he want to use the configuration from.
- DHCP Ack : the chosen DHCP server assigns the IP and configuration parameters and acknowledges.
- DHCP Nack : the DHCP server rejects the client’s request.
- DHCP Decline : the client rejects the offered IP address.
- DHCP Release : the client sends back his assigned IP address beafore the lease expires.
for further information psllsls suck ur own balls and check google suck cunt . imagers troubles in the bark
DHCP starvation attackThis first attack consists of exhausting the DHCP server’s IP addresses pool with a huge number of requests. so fucking huge that can be a ddos tho.
The attacker sends many DHCP requests with differents MAC addresses, which result in using all the available IP addresses. All the new machines that will try to connect to the network will not have any IP.
Then, the attacker can configure his working machine to be the new DHCP server to serve the new machines.
warning: don't conflict it with some zombie shit u know wot I'm saying bitches.
In a DHCP lease, informations about the default gateway and DNS are transmitted. The attacker can propose a lease to newcomers saying that he is the default gateway, which allow Man In The Middle attacks : every packets sent by hosts will go through the attacker machine.
There is a famous framework for level 2 attacks called
Code:
yersinia
that allow us to launch DHCP starvation attacks :
Code:
# yersinia dhcp -attack 1 -interface eth0
Code:
-attack 1
corresponds to ‘DoS attack sending discover packets’. The flag
Code:
-interface
allow us to specify which interface to use during the attack.woho we getting somewhere so fooking hype rat.To stop the attack, just kill the process :
Code:
# killall yersinia
DHCP rogue server attackThe goal of this attack is to introduce in the network a rogue DHCP server that will responds to clients requests.
In order to succeed, you have to respond faster to DHCP Discover requests than the initial DHCP server. This can be done by multiple ways :
- By lauching a DoS attack to the current DHCP server : this will result in a longer time to respond, which give you an advantage.
- By re-implementing DHCP on the attacker machine : DHCP servers usually do other things (DNS, gateway…). Basically, they take more time to respond than a simple DHCP server. Moreover, they have to look into their cache to see if an IP address has already been attributed, etc… So by implementing a DHCP server that will directly respond to a DHCP Discovery request with a hard-coded IP address, it is possible to be faster.
As seen before,
Code:
yersinia
Code:
# yersinia dhcp -attack 2 -interface eth0
Code:
-attack 2
means ‘nonDoS attack creating DHCP rogue server’. This attack mode does not need to use DoS, as its implementation is probably faster than standard DHCP used in home/office routers.How to protect ( here wat I promised to ur papas hole shit cisco nasty mom stuff)Being offensive is nice, but it’s interesting to see the blue side of the Force. I’ll talk about Cisco equipment features.
There is 2 principal ways to avoid those attacks on Cisco equipments : DHCP snooping and IP source guard.
- DHCP snooping allows to filter suspicious DHCP requests, and building what is called a ‘DHCP binding table’. This table contains the DHCP attributions, as MAC addresses, IP addresses, lease duration, VLAN number and corresponding interface.
Each interface that link a client to the switch must be set to untrusted, which only permit DHCP Discover/Request packets to enter; others are dropped.
Ports on which a DHCP server is connected must be set as trusted in order for the switch to accept DHCP Offers and DHCP {Ack,NAck} packets.
The DCHP binding table holds information about untrusted ports, and is fed by dynamic entries learnt via DHCP. On an important network, it is recommended to outsource this table : locally, it is stored in flash memory. For each new entry, its content have to be erased and wrote again. It can also generate heavy CPU loads, and is case of shutdown, all the tables are lost.
It is possible to configure automatic outsourcing as following :
Code:
(config)# ip dhcp snooping database ftp://192.168.42.69/binding-table.dhcp
(config)# ip dhcp snooping database write-delay 300
Code:
write-delay
- IP source guard allow us to protect from IP usurpation obtained by DHCP. In this kind of attack, the attacker changes his IP and/or his MAC address in order to access a remote machine (IP spoofing) or to avoid ACL set by the sysadmin.
To configure IP source guard on a Cisco swicth, you can enter :
Code:
(config)# interface FastEthernet1/0/3 # or whatever interface you want
(config-if)# ip verify source port security
thats all for now but remember ik its frustrating but u needa fuck ur papa and learn it idgaf if u cant just try to learn dumb cunts and don't forget to always be sad anus and monkey eyes