Solved

dhcp flooding, rogue dhcp, network based attacks.

Posted on 2011-02-11
3
995 Views
Last Modified: 2012-05-11
hi,
i'm currently attending a ccna course and last time we discussed aboud network based attacks.
at home i have a quite big test network with a server and several cisco devices.
i would like to test these different attacks especially dhcp flooding in order to set up a rogue dhcp that set my pc as a rogue gateway for  a final MITM attack.

seems easy but i haven't beebn able to find a tool that automatically send a dhcp request with a modified MAC addres.

Is there something like taht? a packet generator that automatically change your mac address? i tried colasoft packetbuilder but, allso i wonderfull for creating single packets, cannot automate the proces.

then, when done this and setted up a rogue dhcp, that seves configuration with myself as defoult gateway, how can i route it to the router transparently?, after sniffing ofcourse.

thanks in advance and don't worry, i'm not a script kiddy asking how to hack the pentagon!
Paolo.
0
Comment
Question by:oloap88
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
skrga earned 500 total points
ID: 34870996
0
 
LVL 5

Expert Comment

by:skrga
ID: 34871025
If you are running Linux, you can do it with Ettercap
link for download:http://ettercap.sourceforge.net/

Tutorial:http://securitytube.net/Ettercap-MITM-Attack-Demo-video.aspx
0
 
LVL 3

Author Closing Comment

by:oloap88
ID: 34876763
thx!
0

Featured Post

SendBlaster Pro 4 - Bulk Email Sending Software

SendBlaster 4 Pro - Best Bulk Emailing Sending Software
Automatic Subscribe / Unsubscribe Processing
Great for Newsletters & Mass Mailings
Optional HTML & Text Composition
Integration with Google Features
Built in Spam Score Checking
Free Professional Templates - Feature Packed!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question