CREATING A FAKE DHCP SERVER using YERSINIA
Yersinia is a network tool designed to take advantage of some weaknesses in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Attacks for the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1Q, IEEE 802.1X, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
- Run Yersiniayersinia -I
- Press I to select the interface, select the required interfaces.
- Press g for protocol selection and select the DHCP.
- Then press x, to select the attack (eXecute attack ) and select the item 2 – Creating Company the DHCP rogue server.
Now configure Rogue DHCP server.
Server IP – the IP server, the name of which will send the answer the DHCP ( 192.168.0.1 );
Start IP – initiaIP, , issued to customers -address address range ( 192.168.0.2 );
End IP – IP , issued to customers -address address range ( 192.168.0.15 );
Time The Lease (secs) – The time in seconds for which the address is given
Time The Renew (secs) – The time in seconds how many clients must renew the address lease
Subnet Mask – Subnet mask for the clients ( 255.255.255.0 );
Router – router address issued to clients ( 192.168.0.10, the address of a fake router);
DNS Server – DNS server provided to clients ( 192.168.0.10, the address of the fake DNS server);
The Domain – a domain name in the local area network ( roguer.local );
and press Enter to start the DHCP server. - To stop the attacks press l, select the active attack and press Enter.In this way, it is possible to deploy a fake DHCP server on the local network.
It only remains to wait until a client connects and receive our network configuration.