June 2017
Intermediate to advanced
258 pages
6h 9m
English
Most organizations run DHCP servers within their environment; yet, very few protect against starvation attacks. The configuration required to protect the DHCP server is very minimal, but powerful. In my penetration test, I will try to exhaust the current DHCP server, spin up my own DHCP server to have clients obtain addresses from me, and then send their traffic through me. Here are the step by step configurations needed to accomplish this task:
Read now
Unlock full access