[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

dhcp flooding, rogue dhcp, network based attacks.

Posted on 2011-02-11
3
Medium Priority
?
1,027 Views
Last Modified: 2012-05-11
hi,
i'm currently attending a ccna course and last time we discussed aboud network based attacks.
at home i have a quite big test network with a server and several cisco devices.
i would like to test these different attacks especially dhcp flooding in order to set up a rogue dhcp that set my pc as a rogue gateway for  a final MITM attack.

seems easy but i haven't beebn able to find a tool that automatically send a dhcp request with a modified MAC addres.

Is there something like taht? a packet generator that automatically change your mac address? i tried colasoft packetbuilder but, allso i wonderfull for creating single packets, cannot automate the proces.

then, when done this and setted up a rogue dhcp, that seves configuration with myself as defoult gateway, how can i route it to the router transparently?, after sniffing ofcourse.

thanks in advance and don't worry, i'm not a script kiddy asking how to hack the pentagon!
Paolo.
0
Comment
Question by:oloap88
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
skrga earned 2000 total points
ID: 34870996
0
 
LVL 5

Expert Comment

by:skrga
ID: 34871025
If you are running Linux, you can do it with Ettercap
link for download:http://ettercap.sourceforge.net/

Tutorial:http://securitytube.net/Ettercap-MITM-Attack-Demo-video.aspx
0
 
LVL 3

Author Closing Comment

by:oloap88
ID: 34876763
thx!
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question