How to perform a DDOS Attack on a DHCP Server

This DDOS attack will send DHCP discover messages until all available DHCP IP addresses within its scope are saturated. Once this attack is completed you could launch a rouge DHCP server and start poisoning DHCP clients with your router or DNS server information.

A tool which allows you to perform this attack is called  Yersinia. This program is included in the well-known Linux penetration tool distribution BackTrack which is available for download on the following site:

http://www.backtrack-linux.org/

Steps to perform:

  • Download BackTrack & Start your distribution
  • Check that the DHCP Server has not leased all available addresses yet

DDOS DHCP 2

  • Login BackTrack and open a terminal window
  • Type yersinia –G to start the graphic interface of  Yersinia

DDOS DHCP 1

  • Click on the DHCP tab
  • Click on the Attack tab and select the Sending DHCP Discover Packets option

DDOS DHCP 4

  • Click OK and watch the amount of requests send

DDOS DHCP 5

  • Click on the List Attacks tab
  • Click on Cancel all Attacks

DDOS DHCP 6

  • Go back to you DHCP server and check if the amount of leased IP addresses has increased

DDOS DHCP 7

Geplaatst op juli 28, 2013, in DDoS, Hacking en getagd als , , , . Markeer de permalink als favoriet. Een reactie plaatsen.

Geef een reactie

Vul je gegevens in of klik op een icoon om in te loggen.

WordPress.com logo

Je reageert onder je WordPress.com account. Log uit / Bijwerken )

Twitter-afbeelding

Je reageert onder je Twitter account. Log uit / Bijwerken )

Facebook foto

Je reageert onder je Facebook account. Log uit / Bijwerken )

Google+ photo

Je reageert onder je Google+ account. Log uit / Bijwerken )

Verbinden met %s

%d bloggers liken dit: