CREATING A FAKE DHCP SERVER using YERSINIA – Penetration Testing

Yersinia is a network tool designed to take advantage of some weaknesses in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Attacks for the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1Q, IEEE 802.1X, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).

Run Yersinia

yersinia -I

Press I to select the interface, select the required interfaces.

Press g for protocol selection and select the DHCP.

Then press x, to select the attack (eXecute attack ) and select the item 2 – Creating Company the DHCP rogue server.
Now configure Rogue DHCP server.Server IP – the IP server, the name of which will send the answer the DHCP ( 192.168.0.1 );Start IP – initiaIP, , issued to customers -address address range ( 192.168.0.2 );End IP – IP , issued to customers -address address range ( 192.168.0.15 );Time The Lease (secs) – The time in seconds for which the address is givenTime The Renew (secs) – The time in seconds how many clients must renew the address leaseSubnet Mask – Subnet mask for the clients ( 255.255.255.0 );Router – router address issued to clients ( 192.168.0.10, the address of a fake router);DNS Server – DNS server provided to clients ( 192.168.0.10, the address of the fake DNS server);The Domain – a domain name in the local area network ( roguer.local );
and press Enter to start the DHCP server.

To stop the attacks press l, select the active attack and press Enter.
In this way, it is possible to deploy a fake DHCP server on the local network.
It only remains to wait until a client connects and receive our network configuration.

The post CREATING A FAKE DHCP SERVER using YERSINIA appeared first on Penetration Testing.

Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s