February 2018
Intermediate to advanced
396 pages
9h 38m
English
In this chapter, we are discussing layer 2 attacks; I bet you are wondering why we talked about a network layer protocol (DHCP in our case). The answer is easy. Attackers can perform what we call DHCP starvation. An attacker broadcasts DHCP requests with spoofed MAC addresses; this attack exploits the DHCP servers address space. This attack can be done using a simple tools, such as the gobbler.
Read now
Unlock full access