Which of the following describes the DHCP “starvation” attack?

Which of the following describes the DHCP “starvation” attack?

Which of the following describes the DHCP “starvation” attack?

A.
Inject a DHCP server on the network for the purpose of overflowing DNS servers with bogus learned host names.

B.
Saturate the network with DHCP requests preventing other network services working

C.
Exhaust the address space available on the DHCP servers so an attacker can inject their own DHCP server to serve addresses for malicious reasons.

D.
DHCP starvation is the act of sending DHCP-response packets for the purpose of overloading layer two CAM tables.

Explanation:
Explanation
DHCP Starvation
A DHCP starvation attack works by broadcasting DHCP requests with spoofed MAC addresses. This is easily achieved with attack tools such as gobbler. If enough requests are sent, the network attacker can exhaust the address space available to the DHCP servers for a period of time. This is a simple resource starvation attack just like a SYN flood is a starvation attack. The network attacker can then set up a rogue DHCP server on his or her system and respond to new DHCP requests from clients on the network. Exhausting all of the DHCP addresses is not required to introduce a rogue DHCP server, though.



Leave a Reply 0

Your email address will not be published. Required fields are marked *