Skip to content

yoelbassin/DHCP-starvation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

DHCP Starvation

DHCP starvation attack is an attack that targets DHCP servers whereby forged DHCP requests are crafted by an attacker with the intent of exhausting all available IP addresses that can be allocated by the DHCP server. Under this attack, legitimate network users can be denied service.

to run the attack you should simply run

python dhcpStarvation.py

If it doesn't run try adding sudo before the command

However, there are some optional options you could add:

python dhcpStarvation.py -p or python dhcpStarvation.py --persistent for a persistent attack, the default attack is temporary

python dhcpStarvation.py -t [TARGET SERVER IP] or python dhcpStarvation.py --target [TARGET SERVER IP] for an attack on a specific server on the network, the default attack is on the first server to reply

python dhcpStarvation.py -i [NETWORK INTERFACE] or python dhcpStarvation.py --iface [NETWORK INTERFACE] for an attack from a specific network interface (depands on the attackers device), the default attack if from the default interface of your system

Tested on Kali Linux

Releases

No releases published

Packages

No packages published

Languages