Press I to select the interface, select the required interfaces.
Press g for protocol selection and select the DHCP.
Then press x, to select the attack (eXecute attack ) and select the item 2 – Creating Company the DHCP rogue server.
Now configure Rogue DHCP server.Server IP – the IP server, the name of which will send the answer the DHCP ( 192.168.0.1 );Start IP – initiaIP, , issued to customers -address address range ( 192.168.0.2 );End IP – IP , issued to customers -address address range ( 192.168.0.15 );Time The Lease (secs) – The time in seconds for which the address is givenTime The Renew (secs) – The time in seconds how many clients must renew the address leaseSubnet Mask – Subnet mask for the clients ( 255.255.255.0 );Router – router address issued to clients ( 192.168.0.10, the address of a fake router);DNS Server – DNS server provided to clients ( 192.168.0.10, the address of the fake DNS server);The Domain – a domain name in the local area network ( roguer.local );
and press Enter to start the DHCP server.
To stop the attacks press l, select the active attack and press Enter.
In this way, it is possible to deploy a fake DHCP server on the local network.
It only remains to wait until a client connects and receive our network configuration.
The post CREATING A FAKE DHCP SERVER using YERSINIA appeared first on Penetration Testing.